Merge ~alexmurray/ubuntu-cve-tracker:validate-cve-dates-in-check-syntax into ubuntu-cve-tracker:master

Proposed by Alex Murray
Status: Merged
Merged at revision: d5be96210f2fa6c50b4ad3ed350ebc75883b9390
Proposed branch: ~alexmurray/ubuntu-cve-tracker:validate-cve-dates-in-check-syntax
Merge into: ubuntu-cve-tracker:master
Diff against target: 8064 lines (+7171/-60)
82 files modified
active/CVE-2012-2666 (+1/-0)
active/CVE-2016-4074 (+1/-1)
active/CVE-2019-10181 (+1/-0)
active/CVE-2019-10185 (+1/-0)
active/CVE-2019-20006 (+6/-3)
active/CVE-2019-20007 (+8/-3)
active/CVE-2020-19715 (+1/-0)
active/CVE-2020-19716 (+1/-0)
active/CVE-2020-22885 (+1/-0)
active/CVE-2020-22886 (+1/-0)
active/CVE-2020-23302 (+4/-3)
active/CVE-2020-23310 (+5/-3)
active/CVE-2020-23320 (+5/-3)
active/CVE-2021-22235 (+3/-2)
active/CVE-2021-22918 (+1/-0)
active/CVE-2021-22921 (+1/-0)
active/CVE-2021-2339 (+158/-0)
active/CVE-2021-2340 (+158/-0)
active/CVE-2021-2341 (+120/-0)
active/CVE-2021-2342 (+158/-0)
active/CVE-2021-2352 (+158/-0)
active/CVE-2021-2354 (+158/-0)
active/CVE-2021-2356 (+160/-0)
active/CVE-2021-2357 (+158/-0)
active/CVE-2021-2367 (+158/-0)
active/CVE-2021-2369 (+120/-0)
active/CVE-2021-2370 (+158/-0)
active/CVE-2021-2372 (+158/-0)
active/CVE-2021-2374 (+158/-0)
active/CVE-2021-2383 (+158/-0)
active/CVE-2021-2384 (+158/-0)
active/CVE-2021-2385 (+160/-0)
active/CVE-2021-2387 (+158/-0)
active/CVE-2021-2388 (+120/-0)
active/CVE-2021-2389 (+158/-0)
active/CVE-2021-2390 (+158/-0)
active/CVE-2021-2399 (+158/-0)
active/CVE-2021-2402 (+158/-0)
active/CVE-2021-2409 (+37/-0)
active/CVE-2021-2410 (+159/-0)
active/CVE-2021-2412 (+159/-0)
active/CVE-2021-2417 (+162/-0)
active/CVE-2021-2418 (+159/-0)
active/CVE-2021-2422 (+159/-0)
active/CVE-2021-2424 (+158/-0)
active/CVE-2021-2425 (+158/-0)
active/CVE-2021-2426 (+158/-0)
active/CVE-2021-2427 (+158/-0)
active/CVE-2021-2429 (+158/-0)
active/CVE-2021-2437 (+158/-0)
active/CVE-2021-2440 (+158/-0)
active/CVE-2021-2441 (+158/-0)
active/CVE-2021-2442 (+36/-0)
active/CVE-2021-2443 (+40/-0)
active/CVE-2021-2444 (+158/-0)
active/CVE-2021-2454 (+35/-0)
active/CVE-2021-27021 (+3/-2)
active/CVE-2021-30639 (+1/-0)
active/CVE-2021-31799 (+7/-5)
active/CVE-2021-31810 (+7/-5)
active/CVE-2021-32066 (+7/-5)
active/CVE-2021-3246 (+29/-0)
active/CVE-2021-32746 (+1/-0)
active/CVE-2021-32747 (+1/-0)
active/CVE-2021-32760 (+14/-9)
active/CVE-2021-33037 (+1/-0)
active/CVE-2021-33909 (+5/-2)
active/CVE-2021-33910 (+4/-2)
active/CVE-2021-34552 (+1/-0)
active/CVE-2021-35039 (+1/-0)
active/CVE-2021-3570 (+1/-0)
active/CVE-2021-3571 (+1/-0)
active/CVE-2021-3612 (+1/-0)
active/CVE-2021-36373 (+1/-0)
active/CVE-2021-36374 (+1/-0)
active/CVE-2021-3655 (+569/-0)
active/CVE-2021-37159 (+572/-0)
check-cves.log (+5/-0)
ignored/not-for-us.txt (+143/-0)
retired/CVE-2012-1102 (+2/-1)
retired/CVE-2020-29374 (+1/-1)
scripts/check-syntax (+17/-10)
Reviewer Review Type Date Requested Status
Alex Murray Approve
Review via email: mp+406056@code.launchpad.net
To post a comment you must log in.
Revision history for this message
Alex Murray (alexmurray) wrote :

Ugh LP seems to have messed up the generated diff - please just look at the commit directly - https://git.launchpad.net/~alexmurray/ubuntu-cve-tracker/commit/?id=62b291328ee95cc9dc549654b1902eb869bae7f4

Revision history for this message
Alex Murray (alexmurray) wrote :

Since no-one has reviewed this and it has been open for 2 weeks now I am merging it anyway.

review: Approve

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/active/CVE-2012-2666 b/active/CVE-2012-2666
2index 9ab75a2..95ec1df 100644
3--- a/active/CVE-2012-2666
4+++ b/active/CVE-2012-2666
5@@ -23,6 +23,7 @@ Priority: low
6 Discovered-by:
7 Assigned-to:
8 CVSS:
9+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10
11 Patches_golang:
12 upstream_golang: released (1.0.2)
13diff --git a/active/CVE-2016-4074 b/active/CVE-2016-4074
14index ee14345..020015c 100644
15--- a/active/CVE-2016-4074
16+++ b/active/CVE-2016-4074
17@@ -8,7 +8,7 @@ References:
18 Description:
19 The jv_dump_term function in jq 1.5 allows remote attackers to cause a
20 denial of service (stack consumption and application crash) via a crafted
21- JSON file.
22+ JSON file. This issue has been fixed in jg 1.6_rc1-r0.
23 Ubuntu-Description:
24 It was discovered that jq did not perform sufficient bounds checking,
25 resulting in unbounded resource consumption. An attacker could use this
26diff --git a/active/CVE-2019-10181 b/active/CVE-2019-10181
27index a59c6fa..c3393ec 100644
28--- a/active/CVE-2019-10181
29+++ b/active/CVE-2019-10181
30@@ -18,6 +18,7 @@ Priority: medium
31 Discovered-by:
32 Assigned-to:
33 CVSS:
34+ nvd: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
35 nvd: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
36
37 Patches_icedtea-web:
38diff --git a/active/CVE-2019-10185 b/active/CVE-2019-10185
39index bedf0c2..5fe3e0d 100644
40--- a/active/CVE-2019-10185
41+++ b/active/CVE-2019-10185
42@@ -19,6 +19,7 @@ Priority: medium
43 Discovered-by:
44 Assigned-to:
45 CVSS:
46+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
47 nvd: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
48
49
50diff --git a/active/CVE-2019-20006 b/active/CVE-2019-20006
51index 0e9587e..590202c 100644
52--- a/active/CVE-2019-20006
53+++ b/active/CVE-2019-20006
54@@ -1,11 +1,13 @@
55 Candidate: CVE-2019-20006
56-PublicDate: 2019-12-31 00:00:00 UTC
57+PublicDate: 2019-12-26 22:15:00 UTC
58 References:
59 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20006
60 https://sourceforge.net/p/ezxml/bugs/15/
61 Description:
62- (An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezx
63- ...)
64+ An issue was discovered in ezXML 0.8.3 through 0.8.6. The function
65+ ezxml_char_content puts a pointer to the internal address of a larger block
66+ as xml->txt. This is later deallocated (using free), leading to a
67+ segmentation fault.
68 Ubuntu-Description:
69 Notes:
70 Mitigation:
71@@ -18,6 +20,7 @@ Priority: medium
72 Discovered-by:
73 Assigned-to:
74 CVSS:
75+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
76
77
78 Patches_mapcache:
79diff --git a/active/CVE-2019-20007 b/active/CVE-2019-20007
80index d419791..faf511b 100644
81--- a/active/CVE-2019-20007
82+++ b/active/CVE-2019-20007
83@@ -1,11 +1,15 @@
84 Candidate: CVE-2019-20007
85-PublicDate: 2019-12-31 00:00:00 UTC
86+PublicDate: 2019-12-26 22:15:00 UTC
87 References:
88 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20007
89 https://sourceforge.net/p/ezxml/bugs/13/
90 Description:
91- (An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezx
92- ...)
93+ An issue was discovered in ezXML 0.8.2 through 0.8.6. The function
94+ ezxml_str2utf8, while parsing a crafted XML file, performs zero-length
95+ reallocation in ezxml.c, leading to returning a NULL pointer (in some
96+ compilers). After this, the function ezxml_parse_str does not check whether
97+ the s variable is not NULL in ezxml.c, leading to a NULL pointer
98+ dereference and crash (segmentation fault).
99 Ubuntu-Description:
100 Notes:
101 Mitigation:
102@@ -18,6 +22,7 @@ Priority: medium
103 Discovered-by:
104 Assigned-to:
105 CVSS:
106+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
107
108
109 Patches_mapcache:
110diff --git a/active/CVE-2020-19715 b/active/CVE-2020-19715
111index 09d6332..3c721dd 100644
112--- a/active/CVE-2020-19715
113+++ b/active/CVE-2020-19715
114@@ -15,6 +15,7 @@ Priority: medium
115 Discovered-by:
116 Assigned-to:
117 CVSS:
118+ nvd: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
119
120
121 Patches_exiv2:
122diff --git a/active/CVE-2020-19716 b/active/CVE-2020-19716
123index a4e46ac..d8e6b07 100644
124--- a/active/CVE-2020-19716
125+++ b/active/CVE-2020-19716
126@@ -14,6 +14,7 @@ Priority: medium
127 Discovered-by:
128 Assigned-to:
129 CVSS:
130+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
131
132
133 Patches_exiv2:
134diff --git a/active/CVE-2020-22885 b/active/CVE-2020-22885
135index 29c69a5..fd505cc 100644
136--- a/active/CVE-2020-22885
137+++ b/active/CVE-2020-22885
138@@ -14,6 +14,7 @@ Priority: medium
139 Discovered-by:
140 Assigned-to:
141 CVSS:
142+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
143
144
145 Patches_mujs:
146diff --git a/active/CVE-2020-22886 b/active/CVE-2020-22886
147index 502c8a6..212cfe1 100644
148--- a/active/CVE-2020-22886
149+++ b/active/CVE-2020-22886
150@@ -14,6 +14,7 @@ Priority: medium
151 Discovered-by:
152 Assigned-to:
153 CVSS:
154+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
155
156
157 Patches_mujs:
158diff --git a/active/CVE-2020-23302 b/active/CVE-2020-23302
159index 1577bf6..d7c99e6 100644
160--- a/active/CVE-2020-23302
161+++ b/active/CVE-2020-23302
162@@ -1,12 +1,12 @@
163 Candidate: CVE-2020-23302
164-PublicDate: 2020-12-31 00:00:00 UTC
165+PublicDate: 2021-06-10 23:15:00 UTC
166 References:
167 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23302
168 https://github.com/jerryscript-project/jerryscript/issues/3748
169 https://github.com/jerryscript-project/jerryscript/pull/3765
170 Description:
171- (There is a heap-use-after-free at ecma-helpers-string.c:772 in ecma_re
172- ...)
173+ There is a heap-use-after-free at ecma-helpers-string.c:772 in
174+ ecma_ref_ecma_string in JerryScript 2.2.0
175 Ubuntu-Description:
176 Notes:
177 Mitigation:
178@@ -16,6 +16,7 @@ Priority: medium
179 Discovered-by:
180 Assigned-to:
181 CVSS:
182+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
183
184
185 Patches_iotjs:
186diff --git a/active/CVE-2020-23310 b/active/CVE-2020-23310
187index 739f11b..50f992a 100644
188--- a/active/CVE-2020-23310
189+++ b/active/CVE-2020-23310
190@@ -1,12 +1,13 @@
191 Candidate: CVE-2020-23310
192-PublicDate: 2020-12-31 00:00:00 UTC
193+PublicDate: 2021-06-10 23:15:00 UTC
194 References:
195 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23310
196 https://github.com/jerryscript-project/jerryscript/issues/3821
197 https://github.com/jerryscript-project/jerryscript/pull/3838
198 Description:
199- (There is an Assertion
200- 'context_p->next_scanner_info_p->type == S ...)
201+ There is an Assertion 'context_p->next_scanner_info_p->type ==
202+ SCANNER_TYPE_FUNCTION' failed at js-parser-statm.c:733 in
203+ parser_parse_function_statement in JerryScript 2.2.0.
204 Ubuntu-Description:
205 Notes:
206 Mitigation:
207@@ -16,6 +17,7 @@ Priority: medium
208 Discovered-by:
209 Assigned-to:
210 CVSS:
211+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
212
213
214 Patches_iotjs:
215diff --git a/active/CVE-2020-23320 b/active/CVE-2020-23320
216index 09e9d7c..5dbe9f9 100644
217--- a/active/CVE-2020-23320
218+++ b/active/CVE-2020-23320
219@@ -1,12 +1,13 @@
220 Candidate: CVE-2020-23320
221-PublicDate: 2020-12-31 00:00:00 UTC
222+PublicDate: 2021-06-10 23:15:00 UTC
223 References:
224 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23320
225 https://github.com/jerryscript-project/jerryscript/issues/3835
226 https://github.com/jerryscript-project/jerryscript/pull/3832
227 Description:
228- (There is an Assertion in
229- 'context_p->next_scanner_info_p->type = ...)
230+ There is an Assertion in 'context_p->next_scanner_info_p->type ==
231+ SCANNER_TYPE_FUNCTION' in parser_parse_function_arguments in JerryScript
232+ 2.2.0.
233 Ubuntu-Description:
234 Notes:
235 Mitigation:
236@@ -16,6 +17,7 @@ Priority: medium
237 Discovered-by:
238 Assigned-to:
239 CVSS:
240+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
241
242
243 Patches_iotjs:
244diff --git a/active/CVE-2021-22235 b/active/CVE-2021-22235
245index 136b225..89bcfe1 100644
246--- a/active/CVE-2021-22235
247+++ b/active/CVE-2021-22235
248@@ -1,11 +1,12 @@
249 Candidate: CVE-2021-22235
250-PublicDate: 2021-07-17 00:00:00 UTC
251+PublicDate: 2021-07-20 12:15:00 UTC
252 References:
253 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
254 https://www.wireshark.org/security/wnpa-sec-2021-06.html
255 https://gitlab.com/wireshark/wireshark/-/issues/17462
256 Description:
257- [Unknown description]
258+ Crash in DNP dissector in Wireshark 3.4.0 to 3.4.6 and 3.2.0 to 3.2.14
259+ allows denial of service via packet injection or crafted capture file
260 Ubuntu-Description:
261 Notes:
262 Mitigation:
263diff --git a/active/CVE-2021-22918 b/active/CVE-2021-22918
264index eba1aa2..f0a7520 100644
265--- a/active/CVE-2021-22918
266+++ b/active/CVE-2021-22918
267@@ -21,6 +21,7 @@ Priority: medium
268 Discovered-by: Eric Sesterhenn
269 Assigned-to: leosilva
270 CVSS:
271+ nvd: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
272
273
274 Patches_libuv1:
275diff --git a/active/CVE-2021-22921 b/active/CVE-2021-22921
276index e511c8a..79cef53 100644
277--- a/active/CVE-2021-22921
278+++ b/active/CVE-2021-22921
279@@ -16,6 +16,7 @@ Priority: medium
280 Discovered-by:
281 Assigned-to:
282 CVSS:
283+ nvd: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
284
285
286 Patches_nodejs:
287diff --git a/active/CVE-2021-2339 b/active/CVE-2021-2339
288new file mode 100644
289index 0000000..19ec1bb
290--- /dev/null
291+++ b/active/CVE-2021-2339
292@@ -0,0 +1,158 @@
293+Candidate: CVE-2021-2339
294+PublicDate: 2021-07-21 15:15:00 UTC
295+References:
296+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339
297+ https://www.oracle.com/security-alerts/cpujul2021.html
298+Description:
299+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
300+ Server: DDL). Supported versions that are affected are 8.0.25 and prior.
301+ Easily exploitable vulnerability allows high privileged attacker with
302+ network access via multiple protocols to compromise MySQL Server.
303+ Successful attacks of this vulnerability can result in unauthorized ability
304+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
305+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
306+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
307+Ubuntu-Description:
308+Notes:
309+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
310+ patch it, marking it as ignored.
311+Mitigation:
312+Bugs:
313+Priority: medium
314+Discovered-by:
315+Assigned-to:
316+CVSS:
317+
318+Patches_mysql-5.5:
319+upstream_mysql-5.5: needs-triage
320+trusty_mysql-5.5: ignored (out of standard support)
321+trusty/esm_mysql-5.5: ignored
322+vivid_mysql-5.5: DNE
323+xenial_mysql-5.5: DNE
324+bionic_mysql-5.5: DNE
325+focal_mysql-5.5: DNE
326+groovy_mysql-5.5: DNE
327+hirsute_mysql-5.5: DNE
328+devel_mysql-5.5: DNE
329+
330+Patches_mysql-5.6:
331+upstream_mysql-5.6: needs-triage
332+trusty_mysql-5.6: ignored (out of standard support)
333+trusty/esm_mysql-5.6: DNE
334+xenial_mysql-5.6: DNE
335+bionic_mysql-5.6: DNE
336+focal_mysql-5.6: DNE
337+groovy_mysql-5.6: DNE
338+hirsute_mysql-5.6: DNE
339+devel_mysql-5.6: DNE
340+
341+Patches_mysql-5.7:
342+upstream_mysql-5.7: needs-triage
343+trusty_mysql-5.7: DNE
344+trusty/esm_mysql-5.7: DNE
345+xenial_mysql-5.7: needs-triage
346+esm-infra/xenial_mysql-5.7: needs-triage
347+bionic_mysql-5.7: needs-triage
348+focal_mysql-5.7: DNE
349+groovy_mysql-5.7: DNE
350+hirsute_mysql-5.7: DNE
351+devel_mysql-5.7: DNE
352+
353+Patches_mysql-8.0:
354+upstream_mysql-8.0: needs-triage
355+trusty_mysql-8.0: DNE
356+trusty/esm_mysql-8.0: DNE
357+xenial_mysql-8.0: DNE
358+bionic_mysql-8.0: DNE
359+focal_mysql-8.0: needs-triage
360+groovy_mysql-8.0: needs-triage
361+hirsute_mysql-8.0: needs-triage
362+devel_mysql-8.0: needs-triage
363+
364+Patches_mariadb-5.5:
365+upstream_mariadb-5.5: needs-triage
366+trusty_mariadb-5.5: ignored (out of standard support)
367+trusty/esm_mariadb-5.5: DNE
368+xenial_mariadb-5.5: DNE
369+bionic_mariadb-5.5: DNE
370+focal_mariadb-5.5: DNE
371+groovy_mariadb-5.5: DNE
372+hirsute_mariadb-5.5: DNE
373+devel_mariadb-5.5: DNE
374+
375+Patches_mariadb-10.0:
376+upstream_mariadb-10.0: needs-triage
377+trusty_mariadb-10.0: DNE
378+trusty/esm_mariadb-10.0: DNE
379+xenial_mariadb-10.0: needs-triage
380+bionic_mariadb-10.0: DNE
381+focal_mariadb-10.0: DNE
382+groovy_mariadb-10.0: DNE
383+hirsute_mariadb-10.0: DNE
384+devel_mariadb-10.0: DNE
385+
386+Patches_mariadb-10.1:
387+upstream_mariadb-10.1: needs-triage
388+trusty_mariadb-10.1: DNE
389+trusty/esm_mariadb-10.1: DNE
390+xenial_mariadb-10.1: DNE
391+bionic_mariadb-10.1: needs-triage
392+focal_mariadb-10.1: DNE
393+groovy_mariadb-10.1: DNE
394+hirsute_mariadb-10.1: DNE
395+devel_mariadb-10.1: DNE
396+
397+Patches_mariadb-10.3:
398+upstream_mariadb-10.3: needs-triage
399+trusty_mariadb-10.3: DNE
400+trusty/esm_mariadb-10.3: DNE
401+xenial_mariadb-10.3: DNE
402+bionic_mariadb-10.3: DNE
403+focal_mariadb-10.3: needs-triage
404+groovy_mariadb-10.3: needs-triage
405+hirsute_mariadb-10.3: DNE
406+devel_mariadb-10.3: DNE
407+
408+Patches_mariadb-10.5:
409+upstream_mariadb-10.5: needs-triage
410+trusty_mariadb-10.5: DNE
411+trusty/esm_mariadb-10.5: DNE
412+xenial_mariadb-10.5: DNE
413+bionic_mariadb-10.5: DNE
414+focal_mariadb-10.5: DNE
415+groovy_mariadb-10.5: DNE
416+hirsute_mariadb-10.5: needs-triage
417+devel_mariadb-10.5: needs-triage
418+
419+Patches_percona-xtradb-cluster-5.5:
420+upstream_percona-xtradb-cluster-5.5: needs-triage
421+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
422+trusty/esm_percona-xtradb-cluster-5.5: DNE
423+xenial_percona-xtradb-cluster-5.5: DNE
424+bionic_percona-xtradb-cluster-5.5: DNE
425+focal_percona-xtradb-cluster-5.5: DNE
426+groovy_percona-xtradb-cluster-5.5: DNE
427+hirsute_percona-xtradb-cluster-5.5: DNE
428+devel_percona-xtradb-cluster-5.5: DNE
429+
430+Patches_percona-xtradb-cluster-5.6:
431+upstream_percona-xtradb-cluster-5.6: needs-triage
432+trusty_percona-xtradb-cluster-5.6: DNE
433+trusty/esm_percona-xtradb-cluster-5.6: DNE
434+xenial_percona-xtradb-cluster-5.6: needs-triage
435+bionic_percona-xtradb-cluster-5.6: DNE
436+focal_percona-xtradb-cluster-5.6: DNE
437+groovy_percona-xtradb-cluster-5.6: DNE
438+hirsute_percona-xtradb-cluster-5.6: DNE
439+devel_percona-xtradb-cluster-5.6: DNE
440+
441+Patches_percona-server-5.6:
442+upstream_percona-server-5.6: needs-triage
443+trusty_percona-server-5.6: DNE
444+trusty/esm_percona-server-5.6: DNE
445+xenial_percona-server-5.6: needs-triage
446+bionic_percona-server-5.6: DNE
447+focal_percona-server-5.6: DNE
448+groovy_percona-server-5.6: DNE
449+hirsute_percona-server-5.6: DNE
450+devel_percona-server-5.6: DNE
451diff --git a/active/CVE-2021-2340 b/active/CVE-2021-2340
452new file mode 100644
453index 0000000..81c947e
454--- /dev/null
455+++ b/active/CVE-2021-2340
456@@ -0,0 +1,158 @@
457+Candidate: CVE-2021-2340
458+PublicDate: 2021-07-21 15:15:00 UTC
459+References:
460+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340
461+ https://www.oracle.com/security-alerts/cpujul2021.html
462+Description:
463+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
464+ Server: Memcached). Supported versions that are affected are 8.0.25 and
465+ prior. Easily exploitable vulnerability allows high privileged attacker
466+ with network access via multiple protocols to compromise MySQL Server.
467+ Successful attacks of this vulnerability can result in unauthorized ability
468+ to cause a partial denial of service (partial DOS) of MySQL Server. CVSS
469+ 3.1 Base Score 2.7 (Availability impacts). CVSS Vector:
470+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
471+Ubuntu-Description:
472+Notes:
473+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
474+ patch it, marking it as ignored.
475+Mitigation:
476+Bugs:
477+Priority: medium
478+Discovered-by:
479+Assigned-to:
480+CVSS:
481+
482+Patches_mysql-5.5:
483+upstream_mysql-5.5: needs-triage
484+trusty_mysql-5.5: ignored (out of standard support)
485+trusty/esm_mysql-5.5: ignored
486+vivid_mysql-5.5: DNE
487+xenial_mysql-5.5: DNE
488+bionic_mysql-5.5: DNE
489+focal_mysql-5.5: DNE
490+groovy_mysql-5.5: DNE
491+hirsute_mysql-5.5: DNE
492+devel_mysql-5.5: DNE
493+
494+Patches_mysql-5.6:
495+upstream_mysql-5.6: needs-triage
496+trusty_mysql-5.6: ignored (out of standard support)
497+trusty/esm_mysql-5.6: DNE
498+xenial_mysql-5.6: DNE
499+bionic_mysql-5.6: DNE
500+focal_mysql-5.6: DNE
501+groovy_mysql-5.6: DNE
502+hirsute_mysql-5.6: DNE
503+devel_mysql-5.6: DNE
504+
505+Patches_mysql-5.7:
506+upstream_mysql-5.7: needs-triage
507+trusty_mysql-5.7: DNE
508+trusty/esm_mysql-5.7: DNE
509+xenial_mysql-5.7: needs-triage
510+esm-infra/xenial_mysql-5.7: needs-triage
511+bionic_mysql-5.7: needs-triage
512+focal_mysql-5.7: DNE
513+groovy_mysql-5.7: DNE
514+hirsute_mysql-5.7: DNE
515+devel_mysql-5.7: DNE
516+
517+Patches_mysql-8.0:
518+upstream_mysql-8.0: needs-triage
519+trusty_mysql-8.0: DNE
520+trusty/esm_mysql-8.0: DNE
521+xenial_mysql-8.0: DNE
522+bionic_mysql-8.0: DNE
523+focal_mysql-8.0: needs-triage
524+groovy_mysql-8.0: needs-triage
525+hirsute_mysql-8.0: needs-triage
526+devel_mysql-8.0: needs-triage
527+
528+Patches_mariadb-5.5:
529+upstream_mariadb-5.5: needs-triage
530+trusty_mariadb-5.5: ignored (out of standard support)
531+trusty/esm_mariadb-5.5: DNE
532+xenial_mariadb-5.5: DNE
533+bionic_mariadb-5.5: DNE
534+focal_mariadb-5.5: DNE
535+groovy_mariadb-5.5: DNE
536+hirsute_mariadb-5.5: DNE
537+devel_mariadb-5.5: DNE
538+
539+Patches_mariadb-10.0:
540+upstream_mariadb-10.0: needs-triage
541+trusty_mariadb-10.0: DNE
542+trusty/esm_mariadb-10.0: DNE
543+xenial_mariadb-10.0: needs-triage
544+bionic_mariadb-10.0: DNE
545+focal_mariadb-10.0: DNE
546+groovy_mariadb-10.0: DNE
547+hirsute_mariadb-10.0: DNE
548+devel_mariadb-10.0: DNE
549+
550+Patches_mariadb-10.1:
551+upstream_mariadb-10.1: needs-triage
552+trusty_mariadb-10.1: DNE
553+trusty/esm_mariadb-10.1: DNE
554+xenial_mariadb-10.1: DNE
555+bionic_mariadb-10.1: needs-triage
556+focal_mariadb-10.1: DNE
557+groovy_mariadb-10.1: DNE
558+hirsute_mariadb-10.1: DNE
559+devel_mariadb-10.1: DNE
560+
561+Patches_mariadb-10.3:
562+upstream_mariadb-10.3: needs-triage
563+trusty_mariadb-10.3: DNE
564+trusty/esm_mariadb-10.3: DNE
565+xenial_mariadb-10.3: DNE
566+bionic_mariadb-10.3: DNE
567+focal_mariadb-10.3: needs-triage
568+groovy_mariadb-10.3: needs-triage
569+hirsute_mariadb-10.3: DNE
570+devel_mariadb-10.3: DNE
571+
572+Patches_mariadb-10.5:
573+upstream_mariadb-10.5: needs-triage
574+trusty_mariadb-10.5: DNE
575+trusty/esm_mariadb-10.5: DNE
576+xenial_mariadb-10.5: DNE
577+bionic_mariadb-10.5: DNE
578+focal_mariadb-10.5: DNE
579+groovy_mariadb-10.5: DNE
580+hirsute_mariadb-10.5: needs-triage
581+devel_mariadb-10.5: needs-triage
582+
583+Patches_percona-xtradb-cluster-5.5:
584+upstream_percona-xtradb-cluster-5.5: needs-triage
585+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
586+trusty/esm_percona-xtradb-cluster-5.5: DNE
587+xenial_percona-xtradb-cluster-5.5: DNE
588+bionic_percona-xtradb-cluster-5.5: DNE
589+focal_percona-xtradb-cluster-5.5: DNE
590+groovy_percona-xtradb-cluster-5.5: DNE
591+hirsute_percona-xtradb-cluster-5.5: DNE
592+devel_percona-xtradb-cluster-5.5: DNE
593+
594+Patches_percona-xtradb-cluster-5.6:
595+upstream_percona-xtradb-cluster-5.6: needs-triage
596+trusty_percona-xtradb-cluster-5.6: DNE
597+trusty/esm_percona-xtradb-cluster-5.6: DNE
598+xenial_percona-xtradb-cluster-5.6: needs-triage
599+bionic_percona-xtradb-cluster-5.6: DNE
600+focal_percona-xtradb-cluster-5.6: DNE
601+groovy_percona-xtradb-cluster-5.6: DNE
602+hirsute_percona-xtradb-cluster-5.6: DNE
603+devel_percona-xtradb-cluster-5.6: DNE
604+
605+Patches_percona-server-5.6:
606+upstream_percona-server-5.6: needs-triage
607+trusty_percona-server-5.6: DNE
608+trusty/esm_percona-server-5.6: DNE
609+xenial_percona-server-5.6: needs-triage
610+bionic_percona-server-5.6: DNE
611+focal_percona-server-5.6: DNE
612+groovy_percona-server-5.6: DNE
613+hirsute_percona-server-5.6: DNE
614+devel_percona-server-5.6: DNE
615diff --git a/active/CVE-2021-2341 b/active/CVE-2021-2341
616new file mode 100644
617index 0000000..64c0c10
618--- /dev/null
619+++ b/active/CVE-2021-2341
620@@ -0,0 +1,120 @@
621+Candidate: CVE-2021-2341
622+PublicDate: 2021-07-21 15:15:00 UTC
623+References:
624+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
625+ https://www.oracle.com/security-alerts/cpujul2021.html
626+Description:
627+ Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of
628+ Oracle Java SE (component: Networking). Supported versions that are
629+ affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM
630+ Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability
631+ allows unauthenticated attacker with network access via multiple protocols
632+ to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful
633+ attacks require human interaction from a person other than the attacker.
634+ Successful attacks of this vulnerability can result in unauthorized read
635+ access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible
636+ data. Note: This vulnerability applies to Java deployments, typically in
637+ clients running sandboxed Java Web Start applications or sandboxed Java
638+ applets, that load and run untrusted code (e.g., code that comes from the
639+ internet) and rely on the Java sandbox for security. This vulnerability
640+ does not apply to Java deployments, typically in servers, that load and run
641+ only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base
642+ Score 3.1 (Confidentiality impacts). CVSS Vector:
643+ (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
644+Ubuntu-Description:
645+Notes:
646+Mitigation:
647+Bugs:
648+Priority: medium
649+Discovered-by:
650+Assigned-to:
651+CVSS:
652+
653+Patches_openjdk-8:
654+upstream_openjdk-8: needs-triage
655+trusty_openjdk-8: DNE
656+trusty/esm_openjdk-8: DNE
657+xenial_openjdk-8: needs-triage
658+esm-infra/xenial_openjdk-8: needs-triage
659+bionic_openjdk-8: needs-triage
660+focal_openjdk-8: needs-triage
661+groovy_openjdk-8: needs-triage
662+hirsute_openjdk-8: needs-triage
663+devel_openjdk-8: needs-triage
664+
665+Patches_icedtea-web:
666+upstream_icedtea-web: needs-triage
667+trusty_icedtea-web: ignored (out of standard support)
668+trusty/esm_icedtea-web: DNE
669+xenial_icedtea-web: needs-triage
670+bionic_icedtea-web: needs-triage
671+focal_icedtea-web: needs-triage
672+groovy_icedtea-web: needs-triage
673+hirsute_icedtea-web: needs-triage
674+devel_icedtea-web: needs-triage
675+
676+Patches_openjdk-9:
677+upstream_openjdk-9: needs-triage
678+trusty_openjdk-9: DNE
679+trusty/esm_openjdk-9: DNE
680+xenial_openjdk-9: needs-triage
681+bionic_openjdk-9: DNE
682+focal_openjdk-9: DNE
683+groovy_openjdk-9: DNE
684+hirsute_openjdk-9: DNE
685+devel_openjdk-9: DNE
686+
687+Patches_openjdk-lts:
688+upstream_openjdk-lts: needs-triage
689+trusty_openjdk-lts: DNE
690+trusty/esm_openjdk-lts: DNE
691+xenial_openjdk-lts: DNE
692+bionic_openjdk-lts: needs-triage
693+focal_openjdk-lts: needs-triage
694+groovy_openjdk-lts: needs-triage
695+hirsute_openjdk-lts: needs-triage
696+devel_openjdk-lts: needs-triage
697+
698+Patches_openjdk-12:
699+upstream_openjdk-12: needs-triage
700+trusty_openjdk-12: DNE
701+trusty/esm_openjdk-12: DNE
702+xenial_openjdk-12: DNE
703+bionic_openjdk-12: DNE
704+focal_openjdk-12: DNE
705+groovy_openjdk-12: DNE
706+hirsute_openjdk-12: DNE
707+devel_openjdk-12: DNE
708+
709+Patches_openjdk-13:
710+upstream_openjdk-13: needs-triage
711+trusty_openjdk-13: DNE
712+trusty/esm_openjdk-13: DNE
713+xenial_openjdk-13: DNE
714+bionic_openjdk-13: DNE
715+focal_openjdk-13: needs-triage
716+groovy_openjdk-13: needs-triage
717+hirsute_openjdk-13: DNE
718+devel_openjdk-13: DNE
719+
720+Patches_openjdk-14:
721+upstream_openjdk-14: needs-triage
722+trusty_openjdk-14: DNE
723+trusty/esm_openjdk-14: DNE
724+xenial_openjdk-14: DNE
725+bionic_openjdk-14: DNE
726+focal_openjdk-14: needs-triage
727+groovy_openjdk-14: needs-triage
728+hirsute_openjdk-14: DNE
729+devel_openjdk-14: DNE
730+
731+Patches_openjdk-15:
732+upstream_openjdk-15: needs-triage
733+trusty_openjdk-15: DNE
734+trusty/esm_openjdk-15: DNE
735+xenial_openjdk-15: DNE
736+bionic_openjdk-15: DNE
737+focal_openjdk-15: DNE
738+groovy_openjdk-15: needs-triage
739+hirsute_openjdk-15: needs-triage
740+devel_openjdk-15: needs-triage
741diff --git a/active/CVE-2021-2342 b/active/CVE-2021-2342
742new file mode 100644
743index 0000000..ebc48a0
744--- /dev/null
745+++ b/active/CVE-2021-2342
746@@ -0,0 +1,158 @@
747+Candidate: CVE-2021-2342
748+PublicDate: 2021-07-21 15:15:00 UTC
749+References:
750+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342
751+ https://www.oracle.com/security-alerts/cpujul2021.html
752+Description:
753+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
754+ Server: Optimizer). Supported versions that are affected are 5.7.34 and
755+ prior and 8.0.25 and prior. Easily exploitable vulnerability allows high
756+ privileged attacker with network access via multiple protocols to
757+ compromise MySQL Server. Successful attacks of this vulnerability can
758+ result in unauthorized ability to cause a hang or frequently repeatable
759+ crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability
760+ impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
761+Ubuntu-Description:
762+Notes:
763+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
764+ patch it, marking it as ignored.
765+Mitigation:
766+Bugs:
767+Priority: medium
768+Discovered-by:
769+Assigned-to:
770+CVSS:
771+
772+Patches_mysql-5.5:
773+upstream_mysql-5.5: needs-triage
774+trusty_mysql-5.5: ignored (out of standard support)
775+trusty/esm_mysql-5.5: ignored
776+vivid_mysql-5.5: DNE
777+xenial_mysql-5.5: DNE
778+bionic_mysql-5.5: DNE
779+focal_mysql-5.5: DNE
780+groovy_mysql-5.5: DNE
781+hirsute_mysql-5.5: DNE
782+devel_mysql-5.5: DNE
783+
784+Patches_mysql-5.6:
785+upstream_mysql-5.6: needs-triage
786+trusty_mysql-5.6: ignored (out of standard support)
787+trusty/esm_mysql-5.6: DNE
788+xenial_mysql-5.6: DNE
789+bionic_mysql-5.6: DNE
790+focal_mysql-5.6: DNE
791+groovy_mysql-5.6: DNE
792+hirsute_mysql-5.6: DNE
793+devel_mysql-5.6: DNE
794+
795+Patches_mysql-5.7:
796+upstream_mysql-5.7: needs-triage
797+trusty_mysql-5.7: DNE
798+trusty/esm_mysql-5.7: DNE
799+xenial_mysql-5.7: needs-triage
800+esm-infra/xenial_mysql-5.7: needs-triage
801+bionic_mysql-5.7: needs-triage
802+focal_mysql-5.7: DNE
803+groovy_mysql-5.7: DNE
804+hirsute_mysql-5.7: DNE
805+devel_mysql-5.7: DNE
806+
807+Patches_mysql-8.0:
808+upstream_mysql-8.0: needs-triage
809+trusty_mysql-8.0: DNE
810+trusty/esm_mysql-8.0: DNE
811+xenial_mysql-8.0: DNE
812+bionic_mysql-8.0: DNE
813+focal_mysql-8.0: needs-triage
814+groovy_mysql-8.0: needs-triage
815+hirsute_mysql-8.0: needs-triage
816+devel_mysql-8.0: needs-triage
817+
818+Patches_mariadb-5.5:
819+upstream_mariadb-5.5: needs-triage
820+trusty_mariadb-5.5: ignored (out of standard support)
821+trusty/esm_mariadb-5.5: DNE
822+xenial_mariadb-5.5: DNE
823+bionic_mariadb-5.5: DNE
824+focal_mariadb-5.5: DNE
825+groovy_mariadb-5.5: DNE
826+hirsute_mariadb-5.5: DNE
827+devel_mariadb-5.5: DNE
828+
829+Patches_mariadb-10.0:
830+upstream_mariadb-10.0: needs-triage
831+trusty_mariadb-10.0: DNE
832+trusty/esm_mariadb-10.0: DNE
833+xenial_mariadb-10.0: needs-triage
834+bionic_mariadb-10.0: DNE
835+focal_mariadb-10.0: DNE
836+groovy_mariadb-10.0: DNE
837+hirsute_mariadb-10.0: DNE
838+devel_mariadb-10.0: DNE
839+
840+Patches_mariadb-10.1:
841+upstream_mariadb-10.1: needs-triage
842+trusty_mariadb-10.1: DNE
843+trusty/esm_mariadb-10.1: DNE
844+xenial_mariadb-10.1: DNE
845+bionic_mariadb-10.1: needs-triage
846+focal_mariadb-10.1: DNE
847+groovy_mariadb-10.1: DNE
848+hirsute_mariadb-10.1: DNE
849+devel_mariadb-10.1: DNE
850+
851+Patches_mariadb-10.3:
852+upstream_mariadb-10.3: needs-triage
853+trusty_mariadb-10.3: DNE
854+trusty/esm_mariadb-10.3: DNE
855+xenial_mariadb-10.3: DNE
856+bionic_mariadb-10.3: DNE
857+focal_mariadb-10.3: needs-triage
858+groovy_mariadb-10.3: needs-triage
859+hirsute_mariadb-10.3: DNE
860+devel_mariadb-10.3: DNE
861+
862+Patches_mariadb-10.5:
863+upstream_mariadb-10.5: needs-triage
864+trusty_mariadb-10.5: DNE
865+trusty/esm_mariadb-10.5: DNE
866+xenial_mariadb-10.5: DNE
867+bionic_mariadb-10.5: DNE
868+focal_mariadb-10.5: DNE
869+groovy_mariadb-10.5: DNE
870+hirsute_mariadb-10.5: needs-triage
871+devel_mariadb-10.5: needs-triage
872+
873+Patches_percona-xtradb-cluster-5.5:
874+upstream_percona-xtradb-cluster-5.5: needs-triage
875+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
876+trusty/esm_percona-xtradb-cluster-5.5: DNE
877+xenial_percona-xtradb-cluster-5.5: DNE
878+bionic_percona-xtradb-cluster-5.5: DNE
879+focal_percona-xtradb-cluster-5.5: DNE
880+groovy_percona-xtradb-cluster-5.5: DNE
881+hirsute_percona-xtradb-cluster-5.5: DNE
882+devel_percona-xtradb-cluster-5.5: DNE
883+
884+Patches_percona-xtradb-cluster-5.6:
885+upstream_percona-xtradb-cluster-5.6: needs-triage
886+trusty_percona-xtradb-cluster-5.6: DNE
887+trusty/esm_percona-xtradb-cluster-5.6: DNE
888+xenial_percona-xtradb-cluster-5.6: needs-triage
889+bionic_percona-xtradb-cluster-5.6: DNE
890+focal_percona-xtradb-cluster-5.6: DNE
891+groovy_percona-xtradb-cluster-5.6: DNE
892+hirsute_percona-xtradb-cluster-5.6: DNE
893+devel_percona-xtradb-cluster-5.6: DNE
894+
895+Patches_percona-server-5.6:
896+upstream_percona-server-5.6: needs-triage
897+trusty_percona-server-5.6: DNE
898+trusty/esm_percona-server-5.6: DNE
899+xenial_percona-server-5.6: needs-triage
900+bionic_percona-server-5.6: DNE
901+focal_percona-server-5.6: DNE
902+groovy_percona-server-5.6: DNE
903+hirsute_percona-server-5.6: DNE
904+devel_percona-server-5.6: DNE
905diff --git a/active/CVE-2021-2352 b/active/CVE-2021-2352
906new file mode 100644
907index 0000000..a4a2bba
908--- /dev/null
909+++ b/active/CVE-2021-2352
910@@ -0,0 +1,158 @@
911+Candidate: CVE-2021-2352
912+PublicDate: 2021-07-21 15:15:00 UTC
913+References:
914+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352
915+ https://www.oracle.com/security-alerts/cpujul2021.html
916+Description:
917+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
918+ Server: DDL). Supported versions that are affected are 8.0.25 and prior.
919+ Easily exploitable vulnerability allows high privileged attacker with
920+ network access via multiple protocols to compromise MySQL Server.
921+ Successful attacks of this vulnerability can result in unauthorized ability
922+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
923+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
924+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
925+Ubuntu-Description:
926+Notes:
927+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
928+ patch it, marking it as ignored.
929+Mitigation:
930+Bugs:
931+Priority: medium
932+Discovered-by:
933+Assigned-to:
934+CVSS:
935+
936+Patches_mysql-5.5:
937+upstream_mysql-5.5: needs-triage
938+trusty_mysql-5.5: ignored (out of standard support)
939+trusty/esm_mysql-5.5: ignored
940+vivid_mysql-5.5: DNE
941+xenial_mysql-5.5: DNE
942+bionic_mysql-5.5: DNE
943+focal_mysql-5.5: DNE
944+groovy_mysql-5.5: DNE
945+hirsute_mysql-5.5: DNE
946+devel_mysql-5.5: DNE
947+
948+Patches_mysql-5.6:
949+upstream_mysql-5.6: needs-triage
950+trusty_mysql-5.6: ignored (out of standard support)
951+trusty/esm_mysql-5.6: DNE
952+xenial_mysql-5.6: DNE
953+bionic_mysql-5.6: DNE
954+focal_mysql-5.6: DNE
955+groovy_mysql-5.6: DNE
956+hirsute_mysql-5.6: DNE
957+devel_mysql-5.6: DNE
958+
959+Patches_mysql-5.7:
960+upstream_mysql-5.7: needs-triage
961+trusty_mysql-5.7: DNE
962+trusty/esm_mysql-5.7: DNE
963+xenial_mysql-5.7: needs-triage
964+esm-infra/xenial_mysql-5.7: needs-triage
965+bionic_mysql-5.7: needs-triage
966+focal_mysql-5.7: DNE
967+groovy_mysql-5.7: DNE
968+hirsute_mysql-5.7: DNE
969+devel_mysql-5.7: DNE
970+
971+Patches_mysql-8.0:
972+upstream_mysql-8.0: needs-triage
973+trusty_mysql-8.0: DNE
974+trusty/esm_mysql-8.0: DNE
975+xenial_mysql-8.0: DNE
976+bionic_mysql-8.0: DNE
977+focal_mysql-8.0: needs-triage
978+groovy_mysql-8.0: needs-triage
979+hirsute_mysql-8.0: needs-triage
980+devel_mysql-8.0: needs-triage
981+
982+Patches_mariadb-5.5:
983+upstream_mariadb-5.5: needs-triage
984+trusty_mariadb-5.5: ignored (out of standard support)
985+trusty/esm_mariadb-5.5: DNE
986+xenial_mariadb-5.5: DNE
987+bionic_mariadb-5.5: DNE
988+focal_mariadb-5.5: DNE
989+groovy_mariadb-5.5: DNE
990+hirsute_mariadb-5.5: DNE
991+devel_mariadb-5.5: DNE
992+
993+Patches_mariadb-10.0:
994+upstream_mariadb-10.0: needs-triage
995+trusty_mariadb-10.0: DNE
996+trusty/esm_mariadb-10.0: DNE
997+xenial_mariadb-10.0: needs-triage
998+bionic_mariadb-10.0: DNE
999+focal_mariadb-10.0: DNE
1000+groovy_mariadb-10.0: DNE
1001+hirsute_mariadb-10.0: DNE
1002+devel_mariadb-10.0: DNE
1003+
1004+Patches_mariadb-10.1:
1005+upstream_mariadb-10.1: needs-triage
1006+trusty_mariadb-10.1: DNE
1007+trusty/esm_mariadb-10.1: DNE
1008+xenial_mariadb-10.1: DNE
1009+bionic_mariadb-10.1: needs-triage
1010+focal_mariadb-10.1: DNE
1011+groovy_mariadb-10.1: DNE
1012+hirsute_mariadb-10.1: DNE
1013+devel_mariadb-10.1: DNE
1014+
1015+Patches_mariadb-10.3:
1016+upstream_mariadb-10.3: needs-triage
1017+trusty_mariadb-10.3: DNE
1018+trusty/esm_mariadb-10.3: DNE
1019+xenial_mariadb-10.3: DNE
1020+bionic_mariadb-10.3: DNE
1021+focal_mariadb-10.3: needs-triage
1022+groovy_mariadb-10.3: needs-triage
1023+hirsute_mariadb-10.3: DNE
1024+devel_mariadb-10.3: DNE
1025+
1026+Patches_mariadb-10.5:
1027+upstream_mariadb-10.5: needs-triage
1028+trusty_mariadb-10.5: DNE
1029+trusty/esm_mariadb-10.5: DNE
1030+xenial_mariadb-10.5: DNE
1031+bionic_mariadb-10.5: DNE
1032+focal_mariadb-10.5: DNE
1033+groovy_mariadb-10.5: DNE
1034+hirsute_mariadb-10.5: needs-triage
1035+devel_mariadb-10.5: needs-triage
1036+
1037+Patches_percona-xtradb-cluster-5.5:
1038+upstream_percona-xtradb-cluster-5.5: needs-triage
1039+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
1040+trusty/esm_percona-xtradb-cluster-5.5: DNE
1041+xenial_percona-xtradb-cluster-5.5: DNE
1042+bionic_percona-xtradb-cluster-5.5: DNE
1043+focal_percona-xtradb-cluster-5.5: DNE
1044+groovy_percona-xtradb-cluster-5.5: DNE
1045+hirsute_percona-xtradb-cluster-5.5: DNE
1046+devel_percona-xtradb-cluster-5.5: DNE
1047+
1048+Patches_percona-xtradb-cluster-5.6:
1049+upstream_percona-xtradb-cluster-5.6: needs-triage
1050+trusty_percona-xtradb-cluster-5.6: DNE
1051+trusty/esm_percona-xtradb-cluster-5.6: DNE
1052+xenial_percona-xtradb-cluster-5.6: needs-triage
1053+bionic_percona-xtradb-cluster-5.6: DNE
1054+focal_percona-xtradb-cluster-5.6: DNE
1055+groovy_percona-xtradb-cluster-5.6: DNE
1056+hirsute_percona-xtradb-cluster-5.6: DNE
1057+devel_percona-xtradb-cluster-5.6: DNE
1058+
1059+Patches_percona-server-5.6:
1060+upstream_percona-server-5.6: needs-triage
1061+trusty_percona-server-5.6: DNE
1062+trusty/esm_percona-server-5.6: DNE
1063+xenial_percona-server-5.6: needs-triage
1064+bionic_percona-server-5.6: DNE
1065+focal_percona-server-5.6: DNE
1066+groovy_percona-server-5.6: DNE
1067+hirsute_percona-server-5.6: DNE
1068+devel_percona-server-5.6: DNE
1069diff --git a/active/CVE-2021-2354 b/active/CVE-2021-2354
1070new file mode 100644
1071index 0000000..e75ca68
1072--- /dev/null
1073+++ b/active/CVE-2021-2354
1074@@ -0,0 +1,158 @@
1075+Candidate: CVE-2021-2354
1076+PublicDate: 2021-07-21 15:15:00 UTC
1077+References:
1078+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354
1079+ https://www.oracle.com/security-alerts/cpujul2021.html
1080+Description:
1081+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
1082+ Server: Federated). Supported versions that are affected are 8.0.25 and
1083+ prior. Easily exploitable vulnerability allows high privileged attacker
1084+ with network access via multiple protocols to compromise MySQL Server.
1085+ Successful attacks of this vulnerability can result in unauthorized ability
1086+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
1087+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
1088+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
1089+Ubuntu-Description:
1090+Notes:
1091+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
1092+ patch it, marking it as ignored.
1093+Mitigation:
1094+Bugs:
1095+Priority: medium
1096+Discovered-by:
1097+Assigned-to:
1098+CVSS:
1099+
1100+Patches_mysql-5.5:
1101+upstream_mysql-5.5: needs-triage
1102+trusty_mysql-5.5: ignored (out of standard support)
1103+trusty/esm_mysql-5.5: ignored
1104+vivid_mysql-5.5: DNE
1105+xenial_mysql-5.5: DNE
1106+bionic_mysql-5.5: DNE
1107+focal_mysql-5.5: DNE
1108+groovy_mysql-5.5: DNE
1109+hirsute_mysql-5.5: DNE
1110+devel_mysql-5.5: DNE
1111+
1112+Patches_mysql-5.6:
1113+upstream_mysql-5.6: needs-triage
1114+trusty_mysql-5.6: ignored (out of standard support)
1115+trusty/esm_mysql-5.6: DNE
1116+xenial_mysql-5.6: DNE
1117+bionic_mysql-5.6: DNE
1118+focal_mysql-5.6: DNE
1119+groovy_mysql-5.6: DNE
1120+hirsute_mysql-5.6: DNE
1121+devel_mysql-5.6: DNE
1122+
1123+Patches_mysql-5.7:
1124+upstream_mysql-5.7: needs-triage
1125+trusty_mysql-5.7: DNE
1126+trusty/esm_mysql-5.7: DNE
1127+xenial_mysql-5.7: needs-triage
1128+esm-infra/xenial_mysql-5.7: needs-triage
1129+bionic_mysql-5.7: needs-triage
1130+focal_mysql-5.7: DNE
1131+groovy_mysql-5.7: DNE
1132+hirsute_mysql-5.7: DNE
1133+devel_mysql-5.7: DNE
1134+
1135+Patches_mysql-8.0:
1136+upstream_mysql-8.0: needs-triage
1137+trusty_mysql-8.0: DNE
1138+trusty/esm_mysql-8.0: DNE
1139+xenial_mysql-8.0: DNE
1140+bionic_mysql-8.0: DNE
1141+focal_mysql-8.0: needs-triage
1142+groovy_mysql-8.0: needs-triage
1143+hirsute_mysql-8.0: needs-triage
1144+devel_mysql-8.0: needs-triage
1145+
1146+Patches_mariadb-5.5:
1147+upstream_mariadb-5.5: needs-triage
1148+trusty_mariadb-5.5: ignored (out of standard support)
1149+trusty/esm_mariadb-5.5: DNE
1150+xenial_mariadb-5.5: DNE
1151+bionic_mariadb-5.5: DNE
1152+focal_mariadb-5.5: DNE
1153+groovy_mariadb-5.5: DNE
1154+hirsute_mariadb-5.5: DNE
1155+devel_mariadb-5.5: DNE
1156+
1157+Patches_mariadb-10.0:
1158+upstream_mariadb-10.0: needs-triage
1159+trusty_mariadb-10.0: DNE
1160+trusty/esm_mariadb-10.0: DNE
1161+xenial_mariadb-10.0: needs-triage
1162+bionic_mariadb-10.0: DNE
1163+focal_mariadb-10.0: DNE
1164+groovy_mariadb-10.0: DNE
1165+hirsute_mariadb-10.0: DNE
1166+devel_mariadb-10.0: DNE
1167+
1168+Patches_mariadb-10.1:
1169+upstream_mariadb-10.1: needs-triage
1170+trusty_mariadb-10.1: DNE
1171+trusty/esm_mariadb-10.1: DNE
1172+xenial_mariadb-10.1: DNE
1173+bionic_mariadb-10.1: needs-triage
1174+focal_mariadb-10.1: DNE
1175+groovy_mariadb-10.1: DNE
1176+hirsute_mariadb-10.1: DNE
1177+devel_mariadb-10.1: DNE
1178+
1179+Patches_mariadb-10.3:
1180+upstream_mariadb-10.3: needs-triage
1181+trusty_mariadb-10.3: DNE
1182+trusty/esm_mariadb-10.3: DNE
1183+xenial_mariadb-10.3: DNE
1184+bionic_mariadb-10.3: DNE
1185+focal_mariadb-10.3: needs-triage
1186+groovy_mariadb-10.3: needs-triage
1187+hirsute_mariadb-10.3: DNE
1188+devel_mariadb-10.3: DNE
1189+
1190+Patches_mariadb-10.5:
1191+upstream_mariadb-10.5: needs-triage
1192+trusty_mariadb-10.5: DNE
1193+trusty/esm_mariadb-10.5: DNE
1194+xenial_mariadb-10.5: DNE
1195+bionic_mariadb-10.5: DNE
1196+focal_mariadb-10.5: DNE
1197+groovy_mariadb-10.5: DNE
1198+hirsute_mariadb-10.5: needs-triage
1199+devel_mariadb-10.5: needs-triage
1200+
1201+Patches_percona-xtradb-cluster-5.5:
1202+upstream_percona-xtradb-cluster-5.5: needs-triage
1203+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
1204+trusty/esm_percona-xtradb-cluster-5.5: DNE
1205+xenial_percona-xtradb-cluster-5.5: DNE
1206+bionic_percona-xtradb-cluster-5.5: DNE
1207+focal_percona-xtradb-cluster-5.5: DNE
1208+groovy_percona-xtradb-cluster-5.5: DNE
1209+hirsute_percona-xtradb-cluster-5.5: DNE
1210+devel_percona-xtradb-cluster-5.5: DNE
1211+
1212+Patches_percona-xtradb-cluster-5.6:
1213+upstream_percona-xtradb-cluster-5.6: needs-triage
1214+trusty_percona-xtradb-cluster-5.6: DNE
1215+trusty/esm_percona-xtradb-cluster-5.6: DNE
1216+xenial_percona-xtradb-cluster-5.6: needs-triage
1217+bionic_percona-xtradb-cluster-5.6: DNE
1218+focal_percona-xtradb-cluster-5.6: DNE
1219+groovy_percona-xtradb-cluster-5.6: DNE
1220+hirsute_percona-xtradb-cluster-5.6: DNE
1221+devel_percona-xtradb-cluster-5.6: DNE
1222+
1223+Patches_percona-server-5.6:
1224+upstream_percona-server-5.6: needs-triage
1225+trusty_percona-server-5.6: DNE
1226+trusty/esm_percona-server-5.6: DNE
1227+xenial_percona-server-5.6: needs-triage
1228+bionic_percona-server-5.6: DNE
1229+focal_percona-server-5.6: DNE
1230+groovy_percona-server-5.6: DNE
1231+hirsute_percona-server-5.6: DNE
1232+devel_percona-server-5.6: DNE
1233diff --git a/active/CVE-2021-2356 b/active/CVE-2021-2356
1234new file mode 100644
1235index 0000000..c0520d7
1236--- /dev/null
1237+++ b/active/CVE-2021-2356
1238@@ -0,0 +1,160 @@
1239+Candidate: CVE-2021-2356
1240+PublicDate: 2021-07-21 15:15:00 UTC
1241+References:
1242+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356
1243+ https://www.oracle.com/security-alerts/cpujul2021.html
1244+Description:
1245+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
1246+ Server: Replication). Supported versions that are affected are 5.7.34 and
1247+ prior and 8.0.25 and prior. Difficult to exploit vulnerability allows low
1248+ privileged attacker with network access via multiple protocols to
1249+ compromise MySQL Server. Successful attacks of this vulnerability can
1250+ result in unauthorized ability to cause a hang or frequently repeatable
1251+ crash (complete DOS) of MySQL Server as well as unauthorized update, insert
1252+ or delete access to some of MySQL Server accessible data. CVSS 3.1 Base
1253+ Score 5.9 (Integrity and Availability impacts). CVSS Vector:
1254+ (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H).
1255+Ubuntu-Description:
1256+Notes:
1257+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
1258+ patch it, marking it as ignored.
1259+Mitigation:
1260+Bugs:
1261+Priority: medium
1262+Discovered-by:
1263+Assigned-to:
1264+CVSS:
1265+
1266+Patches_mysql-5.5:
1267+upstream_mysql-5.5: needs-triage
1268+trusty_mysql-5.5: ignored (out of standard support)
1269+trusty/esm_mysql-5.5: ignored
1270+vivid_mysql-5.5: DNE
1271+xenial_mysql-5.5: DNE
1272+bionic_mysql-5.5: DNE
1273+focal_mysql-5.5: DNE
1274+groovy_mysql-5.5: DNE
1275+hirsute_mysql-5.5: DNE
1276+devel_mysql-5.5: DNE
1277+
1278+Patches_mysql-5.6:
1279+upstream_mysql-5.6: needs-triage
1280+trusty_mysql-5.6: ignored (out of standard support)
1281+trusty/esm_mysql-5.6: DNE
1282+xenial_mysql-5.6: DNE
1283+bionic_mysql-5.6: DNE
1284+focal_mysql-5.6: DNE
1285+groovy_mysql-5.6: DNE
1286+hirsute_mysql-5.6: DNE
1287+devel_mysql-5.6: DNE
1288+
1289+Patches_mysql-5.7:
1290+upstream_mysql-5.7: needs-triage
1291+trusty_mysql-5.7: DNE
1292+trusty/esm_mysql-5.7: DNE
1293+xenial_mysql-5.7: needs-triage
1294+esm-infra/xenial_mysql-5.7: needs-triage
1295+bionic_mysql-5.7: needs-triage
1296+focal_mysql-5.7: DNE
1297+groovy_mysql-5.7: DNE
1298+hirsute_mysql-5.7: DNE
1299+devel_mysql-5.7: DNE
1300+
1301+Patches_mysql-8.0:
1302+upstream_mysql-8.0: needs-triage
1303+trusty_mysql-8.0: DNE
1304+trusty/esm_mysql-8.0: DNE
1305+xenial_mysql-8.0: DNE
1306+bionic_mysql-8.0: DNE
1307+focal_mysql-8.0: needs-triage
1308+groovy_mysql-8.0: needs-triage
1309+hirsute_mysql-8.0: needs-triage
1310+devel_mysql-8.0: needs-triage
1311+
1312+Patches_mariadb-5.5:
1313+upstream_mariadb-5.5: needs-triage
1314+trusty_mariadb-5.5: ignored (out of standard support)
1315+trusty/esm_mariadb-5.5: DNE
1316+xenial_mariadb-5.5: DNE
1317+bionic_mariadb-5.5: DNE
1318+focal_mariadb-5.5: DNE
1319+groovy_mariadb-5.5: DNE
1320+hirsute_mariadb-5.5: DNE
1321+devel_mariadb-5.5: DNE
1322+
1323+Patches_mariadb-10.0:
1324+upstream_mariadb-10.0: needs-triage
1325+trusty_mariadb-10.0: DNE
1326+trusty/esm_mariadb-10.0: DNE
1327+xenial_mariadb-10.0: needs-triage
1328+bionic_mariadb-10.0: DNE
1329+focal_mariadb-10.0: DNE
1330+groovy_mariadb-10.0: DNE
1331+hirsute_mariadb-10.0: DNE
1332+devel_mariadb-10.0: DNE
1333+
1334+Patches_mariadb-10.1:
1335+upstream_mariadb-10.1: needs-triage
1336+trusty_mariadb-10.1: DNE
1337+trusty/esm_mariadb-10.1: DNE
1338+xenial_mariadb-10.1: DNE
1339+bionic_mariadb-10.1: needs-triage
1340+focal_mariadb-10.1: DNE
1341+groovy_mariadb-10.1: DNE
1342+hirsute_mariadb-10.1: DNE
1343+devel_mariadb-10.1: DNE
1344+
1345+Patches_mariadb-10.3:
1346+upstream_mariadb-10.3: needs-triage
1347+trusty_mariadb-10.3: DNE
1348+trusty/esm_mariadb-10.3: DNE
1349+xenial_mariadb-10.3: DNE
1350+bionic_mariadb-10.3: DNE
1351+focal_mariadb-10.3: needs-triage
1352+groovy_mariadb-10.3: needs-triage
1353+hirsute_mariadb-10.3: DNE
1354+devel_mariadb-10.3: DNE
1355+
1356+Patches_mariadb-10.5:
1357+upstream_mariadb-10.5: needs-triage
1358+trusty_mariadb-10.5: DNE
1359+trusty/esm_mariadb-10.5: DNE
1360+xenial_mariadb-10.5: DNE
1361+bionic_mariadb-10.5: DNE
1362+focal_mariadb-10.5: DNE
1363+groovy_mariadb-10.5: DNE
1364+hirsute_mariadb-10.5: needs-triage
1365+devel_mariadb-10.5: needs-triage
1366+
1367+Patches_percona-xtradb-cluster-5.5:
1368+upstream_percona-xtradb-cluster-5.5: needs-triage
1369+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
1370+trusty/esm_percona-xtradb-cluster-5.5: DNE
1371+xenial_percona-xtradb-cluster-5.5: DNE
1372+bionic_percona-xtradb-cluster-5.5: DNE
1373+focal_percona-xtradb-cluster-5.5: DNE
1374+groovy_percona-xtradb-cluster-5.5: DNE
1375+hirsute_percona-xtradb-cluster-5.5: DNE
1376+devel_percona-xtradb-cluster-5.5: DNE
1377+
1378+Patches_percona-xtradb-cluster-5.6:
1379+upstream_percona-xtradb-cluster-5.6: needs-triage
1380+trusty_percona-xtradb-cluster-5.6: DNE
1381+trusty/esm_percona-xtradb-cluster-5.6: DNE
1382+xenial_percona-xtradb-cluster-5.6: needs-triage
1383+bionic_percona-xtradb-cluster-5.6: DNE
1384+focal_percona-xtradb-cluster-5.6: DNE
1385+groovy_percona-xtradb-cluster-5.6: DNE
1386+hirsute_percona-xtradb-cluster-5.6: DNE
1387+devel_percona-xtradb-cluster-5.6: DNE
1388+
1389+Patches_percona-server-5.6:
1390+upstream_percona-server-5.6: needs-triage
1391+trusty_percona-server-5.6: DNE
1392+trusty/esm_percona-server-5.6: DNE
1393+xenial_percona-server-5.6: needs-triage
1394+bionic_percona-server-5.6: DNE
1395+focal_percona-server-5.6: DNE
1396+groovy_percona-server-5.6: DNE
1397+hirsute_percona-server-5.6: DNE
1398+devel_percona-server-5.6: DNE
1399diff --git a/active/CVE-2021-2357 b/active/CVE-2021-2357
1400new file mode 100644
1401index 0000000..afee5e0
1402--- /dev/null
1403+++ b/active/CVE-2021-2357
1404@@ -0,0 +1,158 @@
1405+Candidate: CVE-2021-2357
1406+PublicDate: 2021-07-21 15:15:00 UTC
1407+References:
1408+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357
1409+ https://www.oracle.com/security-alerts/cpujul2021.html
1410+Description:
1411+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
1412+ Server: Optimizer). Supported versions that are affected are 8.0.25 and
1413+ prior. Easily exploitable vulnerability allows high privileged attacker
1414+ with network access via multiple protocols to compromise MySQL Server.
1415+ Successful attacks of this vulnerability can result in unauthorized ability
1416+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
1417+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
1418+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
1419+Ubuntu-Description:
1420+Notes:
1421+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
1422+ patch it, marking it as ignored.
1423+Mitigation:
1424+Bugs:
1425+Priority: medium
1426+Discovered-by:
1427+Assigned-to:
1428+CVSS:
1429+
1430+Patches_mysql-5.5:
1431+upstream_mysql-5.5: needs-triage
1432+trusty_mysql-5.5: ignored (out of standard support)
1433+trusty/esm_mysql-5.5: ignored
1434+vivid_mysql-5.5: DNE
1435+xenial_mysql-5.5: DNE
1436+bionic_mysql-5.5: DNE
1437+focal_mysql-5.5: DNE
1438+groovy_mysql-5.5: DNE
1439+hirsute_mysql-5.5: DNE
1440+devel_mysql-5.5: DNE
1441+
1442+Patches_mysql-5.6:
1443+upstream_mysql-5.6: needs-triage
1444+trusty_mysql-5.6: ignored (out of standard support)
1445+trusty/esm_mysql-5.6: DNE
1446+xenial_mysql-5.6: DNE
1447+bionic_mysql-5.6: DNE
1448+focal_mysql-5.6: DNE
1449+groovy_mysql-5.6: DNE
1450+hirsute_mysql-5.6: DNE
1451+devel_mysql-5.6: DNE
1452+
1453+Patches_mysql-5.7:
1454+upstream_mysql-5.7: needs-triage
1455+trusty_mysql-5.7: DNE
1456+trusty/esm_mysql-5.7: DNE
1457+xenial_mysql-5.7: needs-triage
1458+esm-infra/xenial_mysql-5.7: needs-triage
1459+bionic_mysql-5.7: needs-triage
1460+focal_mysql-5.7: DNE
1461+groovy_mysql-5.7: DNE
1462+hirsute_mysql-5.7: DNE
1463+devel_mysql-5.7: DNE
1464+
1465+Patches_mysql-8.0:
1466+upstream_mysql-8.0: needs-triage
1467+trusty_mysql-8.0: DNE
1468+trusty/esm_mysql-8.0: DNE
1469+xenial_mysql-8.0: DNE
1470+bionic_mysql-8.0: DNE
1471+focal_mysql-8.0: needs-triage
1472+groovy_mysql-8.0: needs-triage
1473+hirsute_mysql-8.0: needs-triage
1474+devel_mysql-8.0: needs-triage
1475+
1476+Patches_mariadb-5.5:
1477+upstream_mariadb-5.5: needs-triage
1478+trusty_mariadb-5.5: ignored (out of standard support)
1479+trusty/esm_mariadb-5.5: DNE
1480+xenial_mariadb-5.5: DNE
1481+bionic_mariadb-5.5: DNE
1482+focal_mariadb-5.5: DNE
1483+groovy_mariadb-5.5: DNE
1484+hirsute_mariadb-5.5: DNE
1485+devel_mariadb-5.5: DNE
1486+
1487+Patches_mariadb-10.0:
1488+upstream_mariadb-10.0: needs-triage
1489+trusty_mariadb-10.0: DNE
1490+trusty/esm_mariadb-10.0: DNE
1491+xenial_mariadb-10.0: needs-triage
1492+bionic_mariadb-10.0: DNE
1493+focal_mariadb-10.0: DNE
1494+groovy_mariadb-10.0: DNE
1495+hirsute_mariadb-10.0: DNE
1496+devel_mariadb-10.0: DNE
1497+
1498+Patches_mariadb-10.1:
1499+upstream_mariadb-10.1: needs-triage
1500+trusty_mariadb-10.1: DNE
1501+trusty/esm_mariadb-10.1: DNE
1502+xenial_mariadb-10.1: DNE
1503+bionic_mariadb-10.1: needs-triage
1504+focal_mariadb-10.1: DNE
1505+groovy_mariadb-10.1: DNE
1506+hirsute_mariadb-10.1: DNE
1507+devel_mariadb-10.1: DNE
1508+
1509+Patches_mariadb-10.3:
1510+upstream_mariadb-10.3: needs-triage
1511+trusty_mariadb-10.3: DNE
1512+trusty/esm_mariadb-10.3: DNE
1513+xenial_mariadb-10.3: DNE
1514+bionic_mariadb-10.3: DNE
1515+focal_mariadb-10.3: needs-triage
1516+groovy_mariadb-10.3: needs-triage
1517+hirsute_mariadb-10.3: DNE
1518+devel_mariadb-10.3: DNE
1519+
1520+Patches_mariadb-10.5:
1521+upstream_mariadb-10.5: needs-triage
1522+trusty_mariadb-10.5: DNE
1523+trusty/esm_mariadb-10.5: DNE
1524+xenial_mariadb-10.5: DNE
1525+bionic_mariadb-10.5: DNE
1526+focal_mariadb-10.5: DNE
1527+groovy_mariadb-10.5: DNE
1528+hirsute_mariadb-10.5: needs-triage
1529+devel_mariadb-10.5: needs-triage
1530+
1531+Patches_percona-xtradb-cluster-5.5:
1532+upstream_percona-xtradb-cluster-5.5: needs-triage
1533+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
1534+trusty/esm_percona-xtradb-cluster-5.5: DNE
1535+xenial_percona-xtradb-cluster-5.5: DNE
1536+bionic_percona-xtradb-cluster-5.5: DNE
1537+focal_percona-xtradb-cluster-5.5: DNE
1538+groovy_percona-xtradb-cluster-5.5: DNE
1539+hirsute_percona-xtradb-cluster-5.5: DNE
1540+devel_percona-xtradb-cluster-5.5: DNE
1541+
1542+Patches_percona-xtradb-cluster-5.6:
1543+upstream_percona-xtradb-cluster-5.6: needs-triage
1544+trusty_percona-xtradb-cluster-5.6: DNE
1545+trusty/esm_percona-xtradb-cluster-5.6: DNE
1546+xenial_percona-xtradb-cluster-5.6: needs-triage
1547+bionic_percona-xtradb-cluster-5.6: DNE
1548+focal_percona-xtradb-cluster-5.6: DNE
1549+groovy_percona-xtradb-cluster-5.6: DNE
1550+hirsute_percona-xtradb-cluster-5.6: DNE
1551+devel_percona-xtradb-cluster-5.6: DNE
1552+
1553+Patches_percona-server-5.6:
1554+upstream_percona-server-5.6: needs-triage
1555+trusty_percona-server-5.6: DNE
1556+trusty/esm_percona-server-5.6: DNE
1557+xenial_percona-server-5.6: needs-triage
1558+bionic_percona-server-5.6: DNE
1559+focal_percona-server-5.6: DNE
1560+groovy_percona-server-5.6: DNE
1561+hirsute_percona-server-5.6: DNE
1562+devel_percona-server-5.6: DNE
1563diff --git a/active/CVE-2021-2367 b/active/CVE-2021-2367
1564new file mode 100644
1565index 0000000..ae61329
1566--- /dev/null
1567+++ b/active/CVE-2021-2367
1568@@ -0,0 +1,158 @@
1569+Candidate: CVE-2021-2367
1570+PublicDate: 2021-07-21 15:15:00 UTC
1571+References:
1572+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367
1573+ https://www.oracle.com/security-alerts/cpujul2021.html
1574+Description:
1575+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
1576+ Server: Optimizer). Supported versions that are affected are 8.0.25 and
1577+ prior. Easily exploitable vulnerability allows high privileged attacker
1578+ with network access via multiple protocols to compromise MySQL Server.
1579+ Successful attacks of this vulnerability can result in unauthorized ability
1580+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
1581+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
1582+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
1583+Ubuntu-Description:
1584+Notes:
1585+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
1586+ patch it, marking it as ignored.
1587+Mitigation:
1588+Bugs:
1589+Priority: medium
1590+Discovered-by:
1591+Assigned-to:
1592+CVSS:
1593+
1594+Patches_mysql-5.5:
1595+upstream_mysql-5.5: needs-triage
1596+trusty_mysql-5.5: ignored (out of standard support)
1597+trusty/esm_mysql-5.5: ignored
1598+vivid_mysql-5.5: DNE
1599+xenial_mysql-5.5: DNE
1600+bionic_mysql-5.5: DNE
1601+focal_mysql-5.5: DNE
1602+groovy_mysql-5.5: DNE
1603+hirsute_mysql-5.5: DNE
1604+devel_mysql-5.5: DNE
1605+
1606+Patches_mysql-5.6:
1607+upstream_mysql-5.6: needs-triage
1608+trusty_mysql-5.6: ignored (out of standard support)
1609+trusty/esm_mysql-5.6: DNE
1610+xenial_mysql-5.6: DNE
1611+bionic_mysql-5.6: DNE
1612+focal_mysql-5.6: DNE
1613+groovy_mysql-5.6: DNE
1614+hirsute_mysql-5.6: DNE
1615+devel_mysql-5.6: DNE
1616+
1617+Patches_mysql-5.7:
1618+upstream_mysql-5.7: needs-triage
1619+trusty_mysql-5.7: DNE
1620+trusty/esm_mysql-5.7: DNE
1621+xenial_mysql-5.7: needs-triage
1622+esm-infra/xenial_mysql-5.7: needs-triage
1623+bionic_mysql-5.7: needs-triage
1624+focal_mysql-5.7: DNE
1625+groovy_mysql-5.7: DNE
1626+hirsute_mysql-5.7: DNE
1627+devel_mysql-5.7: DNE
1628+
1629+Patches_mysql-8.0:
1630+upstream_mysql-8.0: needs-triage
1631+trusty_mysql-8.0: DNE
1632+trusty/esm_mysql-8.0: DNE
1633+xenial_mysql-8.0: DNE
1634+bionic_mysql-8.0: DNE
1635+focal_mysql-8.0: needs-triage
1636+groovy_mysql-8.0: needs-triage
1637+hirsute_mysql-8.0: needs-triage
1638+devel_mysql-8.0: needs-triage
1639+
1640+Patches_mariadb-5.5:
1641+upstream_mariadb-5.5: needs-triage
1642+trusty_mariadb-5.5: ignored (out of standard support)
1643+trusty/esm_mariadb-5.5: DNE
1644+xenial_mariadb-5.5: DNE
1645+bionic_mariadb-5.5: DNE
1646+focal_mariadb-5.5: DNE
1647+groovy_mariadb-5.5: DNE
1648+hirsute_mariadb-5.5: DNE
1649+devel_mariadb-5.5: DNE
1650+
1651+Patches_mariadb-10.0:
1652+upstream_mariadb-10.0: needs-triage
1653+trusty_mariadb-10.0: DNE
1654+trusty/esm_mariadb-10.0: DNE
1655+xenial_mariadb-10.0: needs-triage
1656+bionic_mariadb-10.0: DNE
1657+focal_mariadb-10.0: DNE
1658+groovy_mariadb-10.0: DNE
1659+hirsute_mariadb-10.0: DNE
1660+devel_mariadb-10.0: DNE
1661+
1662+Patches_mariadb-10.1:
1663+upstream_mariadb-10.1: needs-triage
1664+trusty_mariadb-10.1: DNE
1665+trusty/esm_mariadb-10.1: DNE
1666+xenial_mariadb-10.1: DNE
1667+bionic_mariadb-10.1: needs-triage
1668+focal_mariadb-10.1: DNE
1669+groovy_mariadb-10.1: DNE
1670+hirsute_mariadb-10.1: DNE
1671+devel_mariadb-10.1: DNE
1672+
1673+Patches_mariadb-10.3:
1674+upstream_mariadb-10.3: needs-triage
1675+trusty_mariadb-10.3: DNE
1676+trusty/esm_mariadb-10.3: DNE
1677+xenial_mariadb-10.3: DNE
1678+bionic_mariadb-10.3: DNE
1679+focal_mariadb-10.3: needs-triage
1680+groovy_mariadb-10.3: needs-triage
1681+hirsute_mariadb-10.3: DNE
1682+devel_mariadb-10.3: DNE
1683+
1684+Patches_mariadb-10.5:
1685+upstream_mariadb-10.5: needs-triage
1686+trusty_mariadb-10.5: DNE
1687+trusty/esm_mariadb-10.5: DNE
1688+xenial_mariadb-10.5: DNE
1689+bionic_mariadb-10.5: DNE
1690+focal_mariadb-10.5: DNE
1691+groovy_mariadb-10.5: DNE
1692+hirsute_mariadb-10.5: needs-triage
1693+devel_mariadb-10.5: needs-triage
1694+
1695+Patches_percona-xtradb-cluster-5.5:
1696+upstream_percona-xtradb-cluster-5.5: needs-triage
1697+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
1698+trusty/esm_percona-xtradb-cluster-5.5: DNE
1699+xenial_percona-xtradb-cluster-5.5: DNE
1700+bionic_percona-xtradb-cluster-5.5: DNE
1701+focal_percona-xtradb-cluster-5.5: DNE
1702+groovy_percona-xtradb-cluster-5.5: DNE
1703+hirsute_percona-xtradb-cluster-5.5: DNE
1704+devel_percona-xtradb-cluster-5.5: DNE
1705+
1706+Patches_percona-xtradb-cluster-5.6:
1707+upstream_percona-xtradb-cluster-5.6: needs-triage
1708+trusty_percona-xtradb-cluster-5.6: DNE
1709+trusty/esm_percona-xtradb-cluster-5.6: DNE
1710+xenial_percona-xtradb-cluster-5.6: needs-triage
1711+bionic_percona-xtradb-cluster-5.6: DNE
1712+focal_percona-xtradb-cluster-5.6: DNE
1713+groovy_percona-xtradb-cluster-5.6: DNE
1714+hirsute_percona-xtradb-cluster-5.6: DNE
1715+devel_percona-xtradb-cluster-5.6: DNE
1716+
1717+Patches_percona-server-5.6:
1718+upstream_percona-server-5.6: needs-triage
1719+trusty_percona-server-5.6: DNE
1720+trusty/esm_percona-server-5.6: DNE
1721+xenial_percona-server-5.6: needs-triage
1722+bionic_percona-server-5.6: DNE
1723+focal_percona-server-5.6: DNE
1724+groovy_percona-server-5.6: DNE
1725+hirsute_percona-server-5.6: DNE
1726+devel_percona-server-5.6: DNE
1727diff --git a/active/CVE-2021-2369 b/active/CVE-2021-2369
1728new file mode 100644
1729index 0000000..f038427
1730--- /dev/null
1731+++ b/active/CVE-2021-2369
1732@@ -0,0 +1,120 @@
1733+Candidate: CVE-2021-2369
1734+PublicDate: 2021-07-21 15:15:00 UTC
1735+References:
1736+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
1737+ https://www.oracle.com/security-alerts/cpujul2021.html
1738+Description:
1739+ Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of
1740+ Oracle Java SE (component: Library). Supported versions that are affected
1741+ are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise
1742+ Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows
1743+ unauthenticated attacker with network access via multiple protocols to
1744+ compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks
1745+ require human interaction from a person other than the attacker. Successful
1746+ attacks of this vulnerability can result in unauthorized update, insert or
1747+ delete access to some of Java SE, Oracle GraalVM Enterprise Edition
1748+ accessible data. Note: This vulnerability applies to Java deployments,
1749+ typically in clients running sandboxed Java Web Start applications or
1750+ sandboxed Java applets, that load and run untrusted code (e.g., code that
1751+ comes from the internet) and rely on the Java sandbox for security. This
1752+ vulnerability does not apply to Java deployments, typically in servers,
1753+ that load and run only trusted code (e.g., code installed by an
1754+ administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector:
1755+ (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
1756+Ubuntu-Description:
1757+Notes:
1758+Mitigation:
1759+Bugs:
1760+Priority: medium
1761+Discovered-by:
1762+Assigned-to:
1763+CVSS:
1764+
1765+Patches_openjdk-8:
1766+upstream_openjdk-8: needs-triage
1767+trusty_openjdk-8: DNE
1768+trusty/esm_openjdk-8: DNE
1769+xenial_openjdk-8: needs-triage
1770+esm-infra/xenial_openjdk-8: needs-triage
1771+bionic_openjdk-8: needs-triage
1772+focal_openjdk-8: needs-triage
1773+groovy_openjdk-8: needs-triage
1774+hirsute_openjdk-8: needs-triage
1775+devel_openjdk-8: needs-triage
1776+
1777+Patches_icedtea-web:
1778+upstream_icedtea-web: needs-triage
1779+trusty_icedtea-web: ignored (out of standard support)
1780+trusty/esm_icedtea-web: DNE
1781+xenial_icedtea-web: needs-triage
1782+bionic_icedtea-web: needs-triage
1783+focal_icedtea-web: needs-triage
1784+groovy_icedtea-web: needs-triage
1785+hirsute_icedtea-web: needs-triage
1786+devel_icedtea-web: needs-triage
1787+
1788+Patches_openjdk-9:
1789+upstream_openjdk-9: needs-triage
1790+trusty_openjdk-9: DNE
1791+trusty/esm_openjdk-9: DNE
1792+xenial_openjdk-9: needs-triage
1793+bionic_openjdk-9: DNE
1794+focal_openjdk-9: DNE
1795+groovy_openjdk-9: DNE
1796+hirsute_openjdk-9: DNE
1797+devel_openjdk-9: DNE
1798+
1799+Patches_openjdk-lts:
1800+upstream_openjdk-lts: needs-triage
1801+trusty_openjdk-lts: DNE
1802+trusty/esm_openjdk-lts: DNE
1803+xenial_openjdk-lts: DNE
1804+bionic_openjdk-lts: needs-triage
1805+focal_openjdk-lts: needs-triage
1806+groovy_openjdk-lts: needs-triage
1807+hirsute_openjdk-lts: needs-triage
1808+devel_openjdk-lts: needs-triage
1809+
1810+Patches_openjdk-12:
1811+upstream_openjdk-12: needs-triage
1812+trusty_openjdk-12: DNE
1813+trusty/esm_openjdk-12: DNE
1814+xenial_openjdk-12: DNE
1815+bionic_openjdk-12: DNE
1816+focal_openjdk-12: DNE
1817+groovy_openjdk-12: DNE
1818+hirsute_openjdk-12: DNE
1819+devel_openjdk-12: DNE
1820+
1821+Patches_openjdk-13:
1822+upstream_openjdk-13: needs-triage
1823+trusty_openjdk-13: DNE
1824+trusty/esm_openjdk-13: DNE
1825+xenial_openjdk-13: DNE
1826+bionic_openjdk-13: DNE
1827+focal_openjdk-13: needs-triage
1828+groovy_openjdk-13: needs-triage
1829+hirsute_openjdk-13: DNE
1830+devel_openjdk-13: DNE
1831+
1832+Patches_openjdk-14:
1833+upstream_openjdk-14: needs-triage
1834+trusty_openjdk-14: DNE
1835+trusty/esm_openjdk-14: DNE
1836+xenial_openjdk-14: DNE
1837+bionic_openjdk-14: DNE
1838+focal_openjdk-14: needs-triage
1839+groovy_openjdk-14: needs-triage
1840+hirsute_openjdk-14: DNE
1841+devel_openjdk-14: DNE
1842+
1843+Patches_openjdk-15:
1844+upstream_openjdk-15: needs-triage
1845+trusty_openjdk-15: DNE
1846+trusty/esm_openjdk-15: DNE
1847+xenial_openjdk-15: DNE
1848+bionic_openjdk-15: DNE
1849+focal_openjdk-15: DNE
1850+groovy_openjdk-15: needs-triage
1851+hirsute_openjdk-15: needs-triage
1852+devel_openjdk-15: needs-triage
1853diff --git a/active/CVE-2021-2370 b/active/CVE-2021-2370
1854new file mode 100644
1855index 0000000..0b97625
1856--- /dev/null
1857+++ b/active/CVE-2021-2370
1858@@ -0,0 +1,158 @@
1859+Candidate: CVE-2021-2370
1860+PublicDate: 2021-07-21 15:15:00 UTC
1861+References:
1862+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370
1863+ https://www.oracle.com/security-alerts/cpujul2021.html
1864+Description:
1865+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
1866+ Server: DML). Supported versions that are affected are 8.0.25 and prior.
1867+ Easily exploitable vulnerability allows high privileged attacker with
1868+ network access via multiple protocols to compromise MySQL Server.
1869+ Successful attacks of this vulnerability can result in unauthorized ability
1870+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
1871+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
1872+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
1873+Ubuntu-Description:
1874+Notes:
1875+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
1876+ patch it, marking it as ignored.
1877+Mitigation:
1878+Bugs:
1879+Priority: medium
1880+Discovered-by:
1881+Assigned-to:
1882+CVSS:
1883+
1884+Patches_mysql-5.5:
1885+upstream_mysql-5.5: needs-triage
1886+trusty_mysql-5.5: ignored (out of standard support)
1887+trusty/esm_mysql-5.5: ignored
1888+vivid_mysql-5.5: DNE
1889+xenial_mysql-5.5: DNE
1890+bionic_mysql-5.5: DNE
1891+focal_mysql-5.5: DNE
1892+groovy_mysql-5.5: DNE
1893+hirsute_mysql-5.5: DNE
1894+devel_mysql-5.5: DNE
1895+
1896+Patches_mysql-5.6:
1897+upstream_mysql-5.6: needs-triage
1898+trusty_mysql-5.6: ignored (out of standard support)
1899+trusty/esm_mysql-5.6: DNE
1900+xenial_mysql-5.6: DNE
1901+bionic_mysql-5.6: DNE
1902+focal_mysql-5.6: DNE
1903+groovy_mysql-5.6: DNE
1904+hirsute_mysql-5.6: DNE
1905+devel_mysql-5.6: DNE
1906+
1907+Patches_mysql-5.7:
1908+upstream_mysql-5.7: needs-triage
1909+trusty_mysql-5.7: DNE
1910+trusty/esm_mysql-5.7: DNE
1911+xenial_mysql-5.7: needs-triage
1912+esm-infra/xenial_mysql-5.7: needs-triage
1913+bionic_mysql-5.7: needs-triage
1914+focal_mysql-5.7: DNE
1915+groovy_mysql-5.7: DNE
1916+hirsute_mysql-5.7: DNE
1917+devel_mysql-5.7: DNE
1918+
1919+Patches_mysql-8.0:
1920+upstream_mysql-8.0: needs-triage
1921+trusty_mysql-8.0: DNE
1922+trusty/esm_mysql-8.0: DNE
1923+xenial_mysql-8.0: DNE
1924+bionic_mysql-8.0: DNE
1925+focal_mysql-8.0: needs-triage
1926+groovy_mysql-8.0: needs-triage
1927+hirsute_mysql-8.0: needs-triage
1928+devel_mysql-8.0: needs-triage
1929+
1930+Patches_mariadb-5.5:
1931+upstream_mariadb-5.5: needs-triage
1932+trusty_mariadb-5.5: ignored (out of standard support)
1933+trusty/esm_mariadb-5.5: DNE
1934+xenial_mariadb-5.5: DNE
1935+bionic_mariadb-5.5: DNE
1936+focal_mariadb-5.5: DNE
1937+groovy_mariadb-5.5: DNE
1938+hirsute_mariadb-5.5: DNE
1939+devel_mariadb-5.5: DNE
1940+
1941+Patches_mariadb-10.0:
1942+upstream_mariadb-10.0: needs-triage
1943+trusty_mariadb-10.0: DNE
1944+trusty/esm_mariadb-10.0: DNE
1945+xenial_mariadb-10.0: needs-triage
1946+bionic_mariadb-10.0: DNE
1947+focal_mariadb-10.0: DNE
1948+groovy_mariadb-10.0: DNE
1949+hirsute_mariadb-10.0: DNE
1950+devel_mariadb-10.0: DNE
1951+
1952+Patches_mariadb-10.1:
1953+upstream_mariadb-10.1: needs-triage
1954+trusty_mariadb-10.1: DNE
1955+trusty/esm_mariadb-10.1: DNE
1956+xenial_mariadb-10.1: DNE
1957+bionic_mariadb-10.1: needs-triage
1958+focal_mariadb-10.1: DNE
1959+groovy_mariadb-10.1: DNE
1960+hirsute_mariadb-10.1: DNE
1961+devel_mariadb-10.1: DNE
1962+
1963+Patches_mariadb-10.3:
1964+upstream_mariadb-10.3: needs-triage
1965+trusty_mariadb-10.3: DNE
1966+trusty/esm_mariadb-10.3: DNE
1967+xenial_mariadb-10.3: DNE
1968+bionic_mariadb-10.3: DNE
1969+focal_mariadb-10.3: needs-triage
1970+groovy_mariadb-10.3: needs-triage
1971+hirsute_mariadb-10.3: DNE
1972+devel_mariadb-10.3: DNE
1973+
1974+Patches_mariadb-10.5:
1975+upstream_mariadb-10.5: needs-triage
1976+trusty_mariadb-10.5: DNE
1977+trusty/esm_mariadb-10.5: DNE
1978+xenial_mariadb-10.5: DNE
1979+bionic_mariadb-10.5: DNE
1980+focal_mariadb-10.5: DNE
1981+groovy_mariadb-10.5: DNE
1982+hirsute_mariadb-10.5: needs-triage
1983+devel_mariadb-10.5: needs-triage
1984+
1985+Patches_percona-xtradb-cluster-5.5:
1986+upstream_percona-xtradb-cluster-5.5: needs-triage
1987+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
1988+trusty/esm_percona-xtradb-cluster-5.5: DNE
1989+xenial_percona-xtradb-cluster-5.5: DNE
1990+bionic_percona-xtradb-cluster-5.5: DNE
1991+focal_percona-xtradb-cluster-5.5: DNE
1992+groovy_percona-xtradb-cluster-5.5: DNE
1993+hirsute_percona-xtradb-cluster-5.5: DNE
1994+devel_percona-xtradb-cluster-5.5: DNE
1995+
1996+Patches_percona-xtradb-cluster-5.6:
1997+upstream_percona-xtradb-cluster-5.6: needs-triage
1998+trusty_percona-xtradb-cluster-5.6: DNE
1999+trusty/esm_percona-xtradb-cluster-5.6: DNE
2000+xenial_percona-xtradb-cluster-5.6: needs-triage
2001+bionic_percona-xtradb-cluster-5.6: DNE
2002+focal_percona-xtradb-cluster-5.6: DNE
2003+groovy_percona-xtradb-cluster-5.6: DNE
2004+hirsute_percona-xtradb-cluster-5.6: DNE
2005+devel_percona-xtradb-cluster-5.6: DNE
2006+
2007+Patches_percona-server-5.6:
2008+upstream_percona-server-5.6: needs-triage
2009+trusty_percona-server-5.6: DNE
2010+trusty/esm_percona-server-5.6: DNE
2011+xenial_percona-server-5.6: needs-triage
2012+bionic_percona-server-5.6: DNE
2013+focal_percona-server-5.6: DNE
2014+groovy_percona-server-5.6: DNE
2015+hirsute_percona-server-5.6: DNE
2016+devel_percona-server-5.6: DNE
2017diff --git a/active/CVE-2021-2372 b/active/CVE-2021-2372
2018new file mode 100644
2019index 0000000..4d89a9c
2020--- /dev/null
2021+++ b/active/CVE-2021-2372
2022@@ -0,0 +1,158 @@
2023+Candidate: CVE-2021-2372
2024+PublicDate: 2021-07-21 15:15:00 UTC
2025+References:
2026+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
2027+ https://www.oracle.com/security-alerts/cpujul2021.html
2028+Description:
2029+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
2030+ InnoDB). Supported versions that are affected are 5.7.34 and prior and
2031+ 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged
2032+ attacker with network access via multiple protocols to compromise MySQL
2033+ Server. Successful attacks of this vulnerability can result in unauthorized
2034+ ability to cause a hang or frequently repeatable crash (complete DOS) of
2035+ MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector:
2036+ (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
2037+Ubuntu-Description:
2038+Notes:
2039+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
2040+ patch it, marking it as ignored.
2041+Mitigation:
2042+Bugs:
2043+Priority: medium
2044+Discovered-by:
2045+Assigned-to:
2046+CVSS:
2047+
2048+Patches_mysql-5.5:
2049+upstream_mysql-5.5: needs-triage
2050+trusty_mysql-5.5: ignored (out of standard support)
2051+trusty/esm_mysql-5.5: ignored
2052+vivid_mysql-5.5: DNE
2053+xenial_mysql-5.5: DNE
2054+bionic_mysql-5.5: DNE
2055+focal_mysql-5.5: DNE
2056+groovy_mysql-5.5: DNE
2057+hirsute_mysql-5.5: DNE
2058+devel_mysql-5.5: DNE
2059+
2060+Patches_mysql-5.6:
2061+upstream_mysql-5.6: needs-triage
2062+trusty_mysql-5.6: ignored (out of standard support)
2063+trusty/esm_mysql-5.6: DNE
2064+xenial_mysql-5.6: DNE
2065+bionic_mysql-5.6: DNE
2066+focal_mysql-5.6: DNE
2067+groovy_mysql-5.6: DNE
2068+hirsute_mysql-5.6: DNE
2069+devel_mysql-5.6: DNE
2070+
2071+Patches_mysql-5.7:
2072+upstream_mysql-5.7: needs-triage
2073+trusty_mysql-5.7: DNE
2074+trusty/esm_mysql-5.7: DNE
2075+xenial_mysql-5.7: needs-triage
2076+esm-infra/xenial_mysql-5.7: needs-triage
2077+bionic_mysql-5.7: needs-triage
2078+focal_mysql-5.7: DNE
2079+groovy_mysql-5.7: DNE
2080+hirsute_mysql-5.7: DNE
2081+devel_mysql-5.7: DNE
2082+
2083+Patches_mysql-8.0:
2084+upstream_mysql-8.0: needs-triage
2085+trusty_mysql-8.0: DNE
2086+trusty/esm_mysql-8.0: DNE
2087+xenial_mysql-8.0: DNE
2088+bionic_mysql-8.0: DNE
2089+focal_mysql-8.0: needs-triage
2090+groovy_mysql-8.0: needs-triage
2091+hirsute_mysql-8.0: needs-triage
2092+devel_mysql-8.0: needs-triage
2093+
2094+Patches_mariadb-5.5:
2095+upstream_mariadb-5.5: needs-triage
2096+trusty_mariadb-5.5: ignored (out of standard support)
2097+trusty/esm_mariadb-5.5: DNE
2098+xenial_mariadb-5.5: DNE
2099+bionic_mariadb-5.5: DNE
2100+focal_mariadb-5.5: DNE
2101+groovy_mariadb-5.5: DNE
2102+hirsute_mariadb-5.5: DNE
2103+devel_mariadb-5.5: DNE
2104+
2105+Patches_mariadb-10.0:
2106+upstream_mariadb-10.0: needs-triage
2107+trusty_mariadb-10.0: DNE
2108+trusty/esm_mariadb-10.0: DNE
2109+xenial_mariadb-10.0: needs-triage
2110+bionic_mariadb-10.0: DNE
2111+focal_mariadb-10.0: DNE
2112+groovy_mariadb-10.0: DNE
2113+hirsute_mariadb-10.0: DNE
2114+devel_mariadb-10.0: DNE
2115+
2116+Patches_mariadb-10.1:
2117+upstream_mariadb-10.1: needs-triage
2118+trusty_mariadb-10.1: DNE
2119+trusty/esm_mariadb-10.1: DNE
2120+xenial_mariadb-10.1: DNE
2121+bionic_mariadb-10.1: needs-triage
2122+focal_mariadb-10.1: DNE
2123+groovy_mariadb-10.1: DNE
2124+hirsute_mariadb-10.1: DNE
2125+devel_mariadb-10.1: DNE
2126+
2127+Patches_mariadb-10.3:
2128+upstream_mariadb-10.3: needs-triage
2129+trusty_mariadb-10.3: DNE
2130+trusty/esm_mariadb-10.3: DNE
2131+xenial_mariadb-10.3: DNE
2132+bionic_mariadb-10.3: DNE
2133+focal_mariadb-10.3: needs-triage
2134+groovy_mariadb-10.3: needs-triage
2135+hirsute_mariadb-10.3: DNE
2136+devel_mariadb-10.3: DNE
2137+
2138+Patches_mariadb-10.5:
2139+upstream_mariadb-10.5: needs-triage
2140+trusty_mariadb-10.5: DNE
2141+trusty/esm_mariadb-10.5: DNE
2142+xenial_mariadb-10.5: DNE
2143+bionic_mariadb-10.5: DNE
2144+focal_mariadb-10.5: DNE
2145+groovy_mariadb-10.5: DNE
2146+hirsute_mariadb-10.5: needs-triage
2147+devel_mariadb-10.5: needs-triage
2148+
2149+Patches_percona-xtradb-cluster-5.5:
2150+upstream_percona-xtradb-cluster-5.5: needs-triage
2151+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
2152+trusty/esm_percona-xtradb-cluster-5.5: DNE
2153+xenial_percona-xtradb-cluster-5.5: DNE
2154+bionic_percona-xtradb-cluster-5.5: DNE
2155+focal_percona-xtradb-cluster-5.5: DNE
2156+groovy_percona-xtradb-cluster-5.5: DNE
2157+hirsute_percona-xtradb-cluster-5.5: DNE
2158+devel_percona-xtradb-cluster-5.5: DNE
2159+
2160+Patches_percona-xtradb-cluster-5.6:
2161+upstream_percona-xtradb-cluster-5.6: needs-triage
2162+trusty_percona-xtradb-cluster-5.6: DNE
2163+trusty/esm_percona-xtradb-cluster-5.6: DNE
2164+xenial_percona-xtradb-cluster-5.6: needs-triage
2165+bionic_percona-xtradb-cluster-5.6: DNE
2166+focal_percona-xtradb-cluster-5.6: DNE
2167+groovy_percona-xtradb-cluster-5.6: DNE
2168+hirsute_percona-xtradb-cluster-5.6: DNE
2169+devel_percona-xtradb-cluster-5.6: DNE
2170+
2171+Patches_percona-server-5.6:
2172+upstream_percona-server-5.6: needs-triage
2173+trusty_percona-server-5.6: DNE
2174+trusty/esm_percona-server-5.6: DNE
2175+xenial_percona-server-5.6: needs-triage
2176+bionic_percona-server-5.6: DNE
2177+focal_percona-server-5.6: DNE
2178+groovy_percona-server-5.6: DNE
2179+hirsute_percona-server-5.6: DNE
2180+devel_percona-server-5.6: DNE
2181diff --git a/active/CVE-2021-2374 b/active/CVE-2021-2374
2182new file mode 100644
2183index 0000000..916bbc6
2184--- /dev/null
2185+++ b/active/CVE-2021-2374
2186@@ -0,0 +1,158 @@
2187+Candidate: CVE-2021-2374
2188+PublicDate: 2021-07-21 15:15:00 UTC
2189+References:
2190+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374
2191+ https://www.oracle.com/security-alerts/cpujul2021.html
2192+Description:
2193+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
2194+ InnoDB). Supported versions that are affected are 8.0.25 and prior.
2195+ Difficult to exploit vulnerability allows high privileged attacker with
2196+ logon to the infrastructure where MySQL Server executes to compromise MySQL
2197+ Server. Successful attacks of this vulnerability can result in unauthorized
2198+ access to critical data or complete access to all MySQL Server accessible
2199+ data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector:
2200+ (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).
2201+Ubuntu-Description:
2202+Notes:
2203+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
2204+ patch it, marking it as ignored.
2205+Mitigation:
2206+Bugs:
2207+Priority: medium
2208+Discovered-by:
2209+Assigned-to:
2210+CVSS:
2211+
2212+Patches_mysql-5.5:
2213+upstream_mysql-5.5: needs-triage
2214+trusty_mysql-5.5: ignored (out of standard support)
2215+trusty/esm_mysql-5.5: ignored
2216+vivid_mysql-5.5: DNE
2217+xenial_mysql-5.5: DNE
2218+bionic_mysql-5.5: DNE
2219+focal_mysql-5.5: DNE
2220+groovy_mysql-5.5: DNE
2221+hirsute_mysql-5.5: DNE
2222+devel_mysql-5.5: DNE
2223+
2224+Patches_mysql-5.6:
2225+upstream_mysql-5.6: needs-triage
2226+trusty_mysql-5.6: ignored (out of standard support)
2227+trusty/esm_mysql-5.6: DNE
2228+xenial_mysql-5.6: DNE
2229+bionic_mysql-5.6: DNE
2230+focal_mysql-5.6: DNE
2231+groovy_mysql-5.6: DNE
2232+hirsute_mysql-5.6: DNE
2233+devel_mysql-5.6: DNE
2234+
2235+Patches_mysql-5.7:
2236+upstream_mysql-5.7: needs-triage
2237+trusty_mysql-5.7: DNE
2238+trusty/esm_mysql-5.7: DNE
2239+xenial_mysql-5.7: needs-triage
2240+esm-infra/xenial_mysql-5.7: needs-triage
2241+bionic_mysql-5.7: needs-triage
2242+focal_mysql-5.7: DNE
2243+groovy_mysql-5.7: DNE
2244+hirsute_mysql-5.7: DNE
2245+devel_mysql-5.7: DNE
2246+
2247+Patches_mysql-8.0:
2248+upstream_mysql-8.0: needs-triage
2249+trusty_mysql-8.0: DNE
2250+trusty/esm_mysql-8.0: DNE
2251+xenial_mysql-8.0: DNE
2252+bionic_mysql-8.0: DNE
2253+focal_mysql-8.0: needs-triage
2254+groovy_mysql-8.0: needs-triage
2255+hirsute_mysql-8.0: needs-triage
2256+devel_mysql-8.0: needs-triage
2257+
2258+Patches_mariadb-5.5:
2259+upstream_mariadb-5.5: needs-triage
2260+trusty_mariadb-5.5: ignored (out of standard support)
2261+trusty/esm_mariadb-5.5: DNE
2262+xenial_mariadb-5.5: DNE
2263+bionic_mariadb-5.5: DNE
2264+focal_mariadb-5.5: DNE
2265+groovy_mariadb-5.5: DNE
2266+hirsute_mariadb-5.5: DNE
2267+devel_mariadb-5.5: DNE
2268+
2269+Patches_mariadb-10.0:
2270+upstream_mariadb-10.0: needs-triage
2271+trusty_mariadb-10.0: DNE
2272+trusty/esm_mariadb-10.0: DNE
2273+xenial_mariadb-10.0: needs-triage
2274+bionic_mariadb-10.0: DNE
2275+focal_mariadb-10.0: DNE
2276+groovy_mariadb-10.0: DNE
2277+hirsute_mariadb-10.0: DNE
2278+devel_mariadb-10.0: DNE
2279+
2280+Patches_mariadb-10.1:
2281+upstream_mariadb-10.1: needs-triage
2282+trusty_mariadb-10.1: DNE
2283+trusty/esm_mariadb-10.1: DNE
2284+xenial_mariadb-10.1: DNE
2285+bionic_mariadb-10.1: needs-triage
2286+focal_mariadb-10.1: DNE
2287+groovy_mariadb-10.1: DNE
2288+hirsute_mariadb-10.1: DNE
2289+devel_mariadb-10.1: DNE
2290+
2291+Patches_mariadb-10.3:
2292+upstream_mariadb-10.3: needs-triage
2293+trusty_mariadb-10.3: DNE
2294+trusty/esm_mariadb-10.3: DNE
2295+xenial_mariadb-10.3: DNE
2296+bionic_mariadb-10.3: DNE
2297+focal_mariadb-10.3: needs-triage
2298+groovy_mariadb-10.3: needs-triage
2299+hirsute_mariadb-10.3: DNE
2300+devel_mariadb-10.3: DNE
2301+
2302+Patches_mariadb-10.5:
2303+upstream_mariadb-10.5: needs-triage
2304+trusty_mariadb-10.5: DNE
2305+trusty/esm_mariadb-10.5: DNE
2306+xenial_mariadb-10.5: DNE
2307+bionic_mariadb-10.5: DNE
2308+focal_mariadb-10.5: DNE
2309+groovy_mariadb-10.5: DNE
2310+hirsute_mariadb-10.5: needs-triage
2311+devel_mariadb-10.5: needs-triage
2312+
2313+Patches_percona-xtradb-cluster-5.5:
2314+upstream_percona-xtradb-cluster-5.5: needs-triage
2315+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
2316+trusty/esm_percona-xtradb-cluster-5.5: DNE
2317+xenial_percona-xtradb-cluster-5.5: DNE
2318+bionic_percona-xtradb-cluster-5.5: DNE
2319+focal_percona-xtradb-cluster-5.5: DNE
2320+groovy_percona-xtradb-cluster-5.5: DNE
2321+hirsute_percona-xtradb-cluster-5.5: DNE
2322+devel_percona-xtradb-cluster-5.5: DNE
2323+
2324+Patches_percona-xtradb-cluster-5.6:
2325+upstream_percona-xtradb-cluster-5.6: needs-triage
2326+trusty_percona-xtradb-cluster-5.6: DNE
2327+trusty/esm_percona-xtradb-cluster-5.6: DNE
2328+xenial_percona-xtradb-cluster-5.6: needs-triage
2329+bionic_percona-xtradb-cluster-5.6: DNE
2330+focal_percona-xtradb-cluster-5.6: DNE
2331+groovy_percona-xtradb-cluster-5.6: DNE
2332+hirsute_percona-xtradb-cluster-5.6: DNE
2333+devel_percona-xtradb-cluster-5.6: DNE
2334+
2335+Patches_percona-server-5.6:
2336+upstream_percona-server-5.6: needs-triage
2337+trusty_percona-server-5.6: DNE
2338+trusty/esm_percona-server-5.6: DNE
2339+xenial_percona-server-5.6: needs-triage
2340+bionic_percona-server-5.6: DNE
2341+focal_percona-server-5.6: DNE
2342+groovy_percona-server-5.6: DNE
2343+hirsute_percona-server-5.6: DNE
2344+devel_percona-server-5.6: DNE
2345diff --git a/active/CVE-2021-2383 b/active/CVE-2021-2383
2346new file mode 100644
2347index 0000000..5314bc9
2348--- /dev/null
2349+++ b/active/CVE-2021-2383
2350@@ -0,0 +1,158 @@
2351+Candidate: CVE-2021-2383
2352+PublicDate: 2021-07-21 15:15:00 UTC
2353+References:
2354+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383
2355+ https://www.oracle.com/security-alerts/cpujul2021.html
2356+Description:
2357+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
2358+ Server: Optimizer). Supported versions that are affected are 8.0.25 and
2359+ prior. Easily exploitable vulnerability allows high privileged attacker
2360+ with network access via multiple protocols to compromise MySQL Server.
2361+ Successful attacks of this vulnerability can result in unauthorized ability
2362+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
2363+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
2364+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
2365+Ubuntu-Description:
2366+Notes:
2367+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
2368+ patch it, marking it as ignored.
2369+Mitigation:
2370+Bugs:
2371+Priority: medium
2372+Discovered-by:
2373+Assigned-to:
2374+CVSS:
2375+
2376+Patches_mysql-5.5:
2377+upstream_mysql-5.5: needs-triage
2378+trusty_mysql-5.5: ignored (out of standard support)
2379+trusty/esm_mysql-5.5: ignored
2380+vivid_mysql-5.5: DNE
2381+xenial_mysql-5.5: DNE
2382+bionic_mysql-5.5: DNE
2383+focal_mysql-5.5: DNE
2384+groovy_mysql-5.5: DNE
2385+hirsute_mysql-5.5: DNE
2386+devel_mysql-5.5: DNE
2387+
2388+Patches_mysql-5.6:
2389+upstream_mysql-5.6: needs-triage
2390+trusty_mysql-5.6: ignored (out of standard support)
2391+trusty/esm_mysql-5.6: DNE
2392+xenial_mysql-5.6: DNE
2393+bionic_mysql-5.6: DNE
2394+focal_mysql-5.6: DNE
2395+groovy_mysql-5.6: DNE
2396+hirsute_mysql-5.6: DNE
2397+devel_mysql-5.6: DNE
2398+
2399+Patches_mysql-5.7:
2400+upstream_mysql-5.7: needs-triage
2401+trusty_mysql-5.7: DNE
2402+trusty/esm_mysql-5.7: DNE
2403+xenial_mysql-5.7: needs-triage
2404+esm-infra/xenial_mysql-5.7: needs-triage
2405+bionic_mysql-5.7: needs-triage
2406+focal_mysql-5.7: DNE
2407+groovy_mysql-5.7: DNE
2408+hirsute_mysql-5.7: DNE
2409+devel_mysql-5.7: DNE
2410+
2411+Patches_mysql-8.0:
2412+upstream_mysql-8.0: needs-triage
2413+trusty_mysql-8.0: DNE
2414+trusty/esm_mysql-8.0: DNE
2415+xenial_mysql-8.0: DNE
2416+bionic_mysql-8.0: DNE
2417+focal_mysql-8.0: needs-triage
2418+groovy_mysql-8.0: needs-triage
2419+hirsute_mysql-8.0: needs-triage
2420+devel_mysql-8.0: needs-triage
2421+
2422+Patches_mariadb-5.5:
2423+upstream_mariadb-5.5: needs-triage
2424+trusty_mariadb-5.5: ignored (out of standard support)
2425+trusty/esm_mariadb-5.5: DNE
2426+xenial_mariadb-5.5: DNE
2427+bionic_mariadb-5.5: DNE
2428+focal_mariadb-5.5: DNE
2429+groovy_mariadb-5.5: DNE
2430+hirsute_mariadb-5.5: DNE
2431+devel_mariadb-5.5: DNE
2432+
2433+Patches_mariadb-10.0:
2434+upstream_mariadb-10.0: needs-triage
2435+trusty_mariadb-10.0: DNE
2436+trusty/esm_mariadb-10.0: DNE
2437+xenial_mariadb-10.0: needs-triage
2438+bionic_mariadb-10.0: DNE
2439+focal_mariadb-10.0: DNE
2440+groovy_mariadb-10.0: DNE
2441+hirsute_mariadb-10.0: DNE
2442+devel_mariadb-10.0: DNE
2443+
2444+Patches_mariadb-10.1:
2445+upstream_mariadb-10.1: needs-triage
2446+trusty_mariadb-10.1: DNE
2447+trusty/esm_mariadb-10.1: DNE
2448+xenial_mariadb-10.1: DNE
2449+bionic_mariadb-10.1: needs-triage
2450+focal_mariadb-10.1: DNE
2451+groovy_mariadb-10.1: DNE
2452+hirsute_mariadb-10.1: DNE
2453+devel_mariadb-10.1: DNE
2454+
2455+Patches_mariadb-10.3:
2456+upstream_mariadb-10.3: needs-triage
2457+trusty_mariadb-10.3: DNE
2458+trusty/esm_mariadb-10.3: DNE
2459+xenial_mariadb-10.3: DNE
2460+bionic_mariadb-10.3: DNE
2461+focal_mariadb-10.3: needs-triage
2462+groovy_mariadb-10.3: needs-triage
2463+hirsute_mariadb-10.3: DNE
2464+devel_mariadb-10.3: DNE
2465+
2466+Patches_mariadb-10.5:
2467+upstream_mariadb-10.5: needs-triage
2468+trusty_mariadb-10.5: DNE
2469+trusty/esm_mariadb-10.5: DNE
2470+xenial_mariadb-10.5: DNE
2471+bionic_mariadb-10.5: DNE
2472+focal_mariadb-10.5: DNE
2473+groovy_mariadb-10.5: DNE
2474+hirsute_mariadb-10.5: needs-triage
2475+devel_mariadb-10.5: needs-triage
2476+
2477+Patches_percona-xtradb-cluster-5.5:
2478+upstream_percona-xtradb-cluster-5.5: needs-triage
2479+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
2480+trusty/esm_percona-xtradb-cluster-5.5: DNE
2481+xenial_percona-xtradb-cluster-5.5: DNE
2482+bionic_percona-xtradb-cluster-5.5: DNE
2483+focal_percona-xtradb-cluster-5.5: DNE
2484+groovy_percona-xtradb-cluster-5.5: DNE
2485+hirsute_percona-xtradb-cluster-5.5: DNE
2486+devel_percona-xtradb-cluster-5.5: DNE
2487+
2488+Patches_percona-xtradb-cluster-5.6:
2489+upstream_percona-xtradb-cluster-5.6: needs-triage
2490+trusty_percona-xtradb-cluster-5.6: DNE
2491+trusty/esm_percona-xtradb-cluster-5.6: DNE
2492+xenial_percona-xtradb-cluster-5.6: needs-triage
2493+bionic_percona-xtradb-cluster-5.6: DNE
2494+focal_percona-xtradb-cluster-5.6: DNE
2495+groovy_percona-xtradb-cluster-5.6: DNE
2496+hirsute_percona-xtradb-cluster-5.6: DNE
2497+devel_percona-xtradb-cluster-5.6: DNE
2498+
2499+Patches_percona-server-5.6:
2500+upstream_percona-server-5.6: needs-triage
2501+trusty_percona-server-5.6: DNE
2502+trusty/esm_percona-server-5.6: DNE
2503+xenial_percona-server-5.6: needs-triage
2504+bionic_percona-server-5.6: DNE
2505+focal_percona-server-5.6: DNE
2506+groovy_percona-server-5.6: DNE
2507+hirsute_percona-server-5.6: DNE
2508+devel_percona-server-5.6: DNE
2509diff --git a/active/CVE-2021-2384 b/active/CVE-2021-2384
2510new file mode 100644
2511index 0000000..50e1e63
2512--- /dev/null
2513+++ b/active/CVE-2021-2384
2514@@ -0,0 +1,158 @@
2515+Candidate: CVE-2021-2384
2516+PublicDate: 2021-07-21 15:15:00 UTC
2517+References:
2518+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384
2519+ https://www.oracle.com/security-alerts/cpujul2021.html
2520+Description:
2521+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
2522+ Server: Optimizer). Supported versions that are affected are 8.0.25 and
2523+ prior. Easily exploitable vulnerability allows high privileged attacker
2524+ with network access via multiple protocols to compromise MySQL Server.
2525+ Successful attacks of this vulnerability can result in unauthorized ability
2526+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
2527+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
2528+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
2529+Ubuntu-Description:
2530+Notes:
2531+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
2532+ patch it, marking it as ignored.
2533+Mitigation:
2534+Bugs:
2535+Priority: medium
2536+Discovered-by:
2537+Assigned-to:
2538+CVSS:
2539+
2540+Patches_mysql-5.5:
2541+upstream_mysql-5.5: needs-triage
2542+trusty_mysql-5.5: ignored (out of standard support)
2543+trusty/esm_mysql-5.5: ignored
2544+vivid_mysql-5.5: DNE
2545+xenial_mysql-5.5: DNE
2546+bionic_mysql-5.5: DNE
2547+focal_mysql-5.5: DNE
2548+groovy_mysql-5.5: DNE
2549+hirsute_mysql-5.5: DNE
2550+devel_mysql-5.5: DNE
2551+
2552+Patches_mysql-5.6:
2553+upstream_mysql-5.6: needs-triage
2554+trusty_mysql-5.6: ignored (out of standard support)
2555+trusty/esm_mysql-5.6: DNE
2556+xenial_mysql-5.6: DNE
2557+bionic_mysql-5.6: DNE
2558+focal_mysql-5.6: DNE
2559+groovy_mysql-5.6: DNE
2560+hirsute_mysql-5.6: DNE
2561+devel_mysql-5.6: DNE
2562+
2563+Patches_mysql-5.7:
2564+upstream_mysql-5.7: needs-triage
2565+trusty_mysql-5.7: DNE
2566+trusty/esm_mysql-5.7: DNE
2567+xenial_mysql-5.7: needs-triage
2568+esm-infra/xenial_mysql-5.7: needs-triage
2569+bionic_mysql-5.7: needs-triage
2570+focal_mysql-5.7: DNE
2571+groovy_mysql-5.7: DNE
2572+hirsute_mysql-5.7: DNE
2573+devel_mysql-5.7: DNE
2574+
2575+Patches_mysql-8.0:
2576+upstream_mysql-8.0: needs-triage
2577+trusty_mysql-8.0: DNE
2578+trusty/esm_mysql-8.0: DNE
2579+xenial_mysql-8.0: DNE
2580+bionic_mysql-8.0: DNE
2581+focal_mysql-8.0: needs-triage
2582+groovy_mysql-8.0: needs-triage
2583+hirsute_mysql-8.0: needs-triage
2584+devel_mysql-8.0: needs-triage
2585+
2586+Patches_mariadb-5.5:
2587+upstream_mariadb-5.5: needs-triage
2588+trusty_mariadb-5.5: ignored (out of standard support)
2589+trusty/esm_mariadb-5.5: DNE
2590+xenial_mariadb-5.5: DNE
2591+bionic_mariadb-5.5: DNE
2592+focal_mariadb-5.5: DNE
2593+groovy_mariadb-5.5: DNE
2594+hirsute_mariadb-5.5: DNE
2595+devel_mariadb-5.5: DNE
2596+
2597+Patches_mariadb-10.0:
2598+upstream_mariadb-10.0: needs-triage
2599+trusty_mariadb-10.0: DNE
2600+trusty/esm_mariadb-10.0: DNE
2601+xenial_mariadb-10.0: needs-triage
2602+bionic_mariadb-10.0: DNE
2603+focal_mariadb-10.0: DNE
2604+groovy_mariadb-10.0: DNE
2605+hirsute_mariadb-10.0: DNE
2606+devel_mariadb-10.0: DNE
2607+
2608+Patches_mariadb-10.1:
2609+upstream_mariadb-10.1: needs-triage
2610+trusty_mariadb-10.1: DNE
2611+trusty/esm_mariadb-10.1: DNE
2612+xenial_mariadb-10.1: DNE
2613+bionic_mariadb-10.1: needs-triage
2614+focal_mariadb-10.1: DNE
2615+groovy_mariadb-10.1: DNE
2616+hirsute_mariadb-10.1: DNE
2617+devel_mariadb-10.1: DNE
2618+
2619+Patches_mariadb-10.3:
2620+upstream_mariadb-10.3: needs-triage
2621+trusty_mariadb-10.3: DNE
2622+trusty/esm_mariadb-10.3: DNE
2623+xenial_mariadb-10.3: DNE
2624+bionic_mariadb-10.3: DNE
2625+focal_mariadb-10.3: needs-triage
2626+groovy_mariadb-10.3: needs-triage
2627+hirsute_mariadb-10.3: DNE
2628+devel_mariadb-10.3: DNE
2629+
2630+Patches_mariadb-10.5:
2631+upstream_mariadb-10.5: needs-triage
2632+trusty_mariadb-10.5: DNE
2633+trusty/esm_mariadb-10.5: DNE
2634+xenial_mariadb-10.5: DNE
2635+bionic_mariadb-10.5: DNE
2636+focal_mariadb-10.5: DNE
2637+groovy_mariadb-10.5: DNE
2638+hirsute_mariadb-10.5: needs-triage
2639+devel_mariadb-10.5: needs-triage
2640+
2641+Patches_percona-xtradb-cluster-5.5:
2642+upstream_percona-xtradb-cluster-5.5: needs-triage
2643+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
2644+trusty/esm_percona-xtradb-cluster-5.5: DNE
2645+xenial_percona-xtradb-cluster-5.5: DNE
2646+bionic_percona-xtradb-cluster-5.5: DNE
2647+focal_percona-xtradb-cluster-5.5: DNE
2648+groovy_percona-xtradb-cluster-5.5: DNE
2649+hirsute_percona-xtradb-cluster-5.5: DNE
2650+devel_percona-xtradb-cluster-5.5: DNE
2651+
2652+Patches_percona-xtradb-cluster-5.6:
2653+upstream_percona-xtradb-cluster-5.6: needs-triage
2654+trusty_percona-xtradb-cluster-5.6: DNE
2655+trusty/esm_percona-xtradb-cluster-5.6: DNE
2656+xenial_percona-xtradb-cluster-5.6: needs-triage
2657+bionic_percona-xtradb-cluster-5.6: DNE
2658+focal_percona-xtradb-cluster-5.6: DNE
2659+groovy_percona-xtradb-cluster-5.6: DNE
2660+hirsute_percona-xtradb-cluster-5.6: DNE
2661+devel_percona-xtradb-cluster-5.6: DNE
2662+
2663+Patches_percona-server-5.6:
2664+upstream_percona-server-5.6: needs-triage
2665+trusty_percona-server-5.6: DNE
2666+trusty/esm_percona-server-5.6: DNE
2667+xenial_percona-server-5.6: needs-triage
2668+bionic_percona-server-5.6: DNE
2669+focal_percona-server-5.6: DNE
2670+groovy_percona-server-5.6: DNE
2671+hirsute_percona-server-5.6: DNE
2672+devel_percona-server-5.6: DNE
2673diff --git a/active/CVE-2021-2385 b/active/CVE-2021-2385
2674new file mode 100644
2675index 0000000..ffd3d0e
2676--- /dev/null
2677+++ b/active/CVE-2021-2385
2678@@ -0,0 +1,160 @@
2679+Candidate: CVE-2021-2385
2680+PublicDate: 2021-07-21 15:15:00 UTC
2681+References:
2682+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385
2683+ https://www.oracle.com/security-alerts/cpujul2021.html
2684+Description:
2685+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
2686+ Server: Replication). Supported versions that are affected are 5.7.34 and
2687+ prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high
2688+ privileged attacker with network access via multiple protocols to
2689+ compromise MySQL Server. Successful attacks of this vulnerability can
2690+ result in unauthorized ability to cause a hang or frequently repeatable
2691+ crash (complete DOS) of MySQL Server as well as unauthorized update, insert
2692+ or delete access to some of MySQL Server accessible data. CVSS 3.1 Base
2693+ Score 5.0 (Integrity and Availability impacts). CVSS Vector:
2694+ (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).
2695+Ubuntu-Description:
2696+Notes:
2697+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
2698+ patch it, marking it as ignored.
2699+Mitigation:
2700+Bugs:
2701+Priority: medium
2702+Discovered-by:
2703+Assigned-to:
2704+CVSS:
2705+
2706+Patches_mysql-5.5:
2707+upstream_mysql-5.5: needs-triage
2708+trusty_mysql-5.5: ignored (out of standard support)
2709+trusty/esm_mysql-5.5: ignored
2710+vivid_mysql-5.5: DNE
2711+xenial_mysql-5.5: DNE
2712+bionic_mysql-5.5: DNE
2713+focal_mysql-5.5: DNE
2714+groovy_mysql-5.5: DNE
2715+hirsute_mysql-5.5: DNE
2716+devel_mysql-5.5: DNE
2717+
2718+Patches_mysql-5.6:
2719+upstream_mysql-5.6: needs-triage
2720+trusty_mysql-5.6: ignored (out of standard support)
2721+trusty/esm_mysql-5.6: DNE
2722+xenial_mysql-5.6: DNE
2723+bionic_mysql-5.6: DNE
2724+focal_mysql-5.6: DNE
2725+groovy_mysql-5.6: DNE
2726+hirsute_mysql-5.6: DNE
2727+devel_mysql-5.6: DNE
2728+
2729+Patches_mysql-5.7:
2730+upstream_mysql-5.7: needs-triage
2731+trusty_mysql-5.7: DNE
2732+trusty/esm_mysql-5.7: DNE
2733+xenial_mysql-5.7: needs-triage
2734+esm-infra/xenial_mysql-5.7: needs-triage
2735+bionic_mysql-5.7: needs-triage
2736+focal_mysql-5.7: DNE
2737+groovy_mysql-5.7: DNE
2738+hirsute_mysql-5.7: DNE
2739+devel_mysql-5.7: DNE
2740+
2741+Patches_mysql-8.0:
2742+upstream_mysql-8.0: needs-triage
2743+trusty_mysql-8.0: DNE
2744+trusty/esm_mysql-8.0: DNE
2745+xenial_mysql-8.0: DNE
2746+bionic_mysql-8.0: DNE
2747+focal_mysql-8.0: needs-triage
2748+groovy_mysql-8.0: needs-triage
2749+hirsute_mysql-8.0: needs-triage
2750+devel_mysql-8.0: needs-triage
2751+
2752+Patches_mariadb-5.5:
2753+upstream_mariadb-5.5: needs-triage
2754+trusty_mariadb-5.5: ignored (out of standard support)
2755+trusty/esm_mariadb-5.5: DNE
2756+xenial_mariadb-5.5: DNE
2757+bionic_mariadb-5.5: DNE
2758+focal_mariadb-5.5: DNE
2759+groovy_mariadb-5.5: DNE
2760+hirsute_mariadb-5.5: DNE
2761+devel_mariadb-5.5: DNE
2762+
2763+Patches_mariadb-10.0:
2764+upstream_mariadb-10.0: needs-triage
2765+trusty_mariadb-10.0: DNE
2766+trusty/esm_mariadb-10.0: DNE
2767+xenial_mariadb-10.0: needs-triage
2768+bionic_mariadb-10.0: DNE
2769+focal_mariadb-10.0: DNE
2770+groovy_mariadb-10.0: DNE
2771+hirsute_mariadb-10.0: DNE
2772+devel_mariadb-10.0: DNE
2773+
2774+Patches_mariadb-10.1:
2775+upstream_mariadb-10.1: needs-triage
2776+trusty_mariadb-10.1: DNE
2777+trusty/esm_mariadb-10.1: DNE
2778+xenial_mariadb-10.1: DNE
2779+bionic_mariadb-10.1: needs-triage
2780+focal_mariadb-10.1: DNE
2781+groovy_mariadb-10.1: DNE
2782+hirsute_mariadb-10.1: DNE
2783+devel_mariadb-10.1: DNE
2784+
2785+Patches_mariadb-10.3:
2786+upstream_mariadb-10.3: needs-triage
2787+trusty_mariadb-10.3: DNE
2788+trusty/esm_mariadb-10.3: DNE
2789+xenial_mariadb-10.3: DNE
2790+bionic_mariadb-10.3: DNE
2791+focal_mariadb-10.3: needs-triage
2792+groovy_mariadb-10.3: needs-triage
2793+hirsute_mariadb-10.3: DNE
2794+devel_mariadb-10.3: DNE
2795+
2796+Patches_mariadb-10.5:
2797+upstream_mariadb-10.5: needs-triage
2798+trusty_mariadb-10.5: DNE
2799+trusty/esm_mariadb-10.5: DNE
2800+xenial_mariadb-10.5: DNE
2801+bionic_mariadb-10.5: DNE
2802+focal_mariadb-10.5: DNE
2803+groovy_mariadb-10.5: DNE
2804+hirsute_mariadb-10.5: needs-triage
2805+devel_mariadb-10.5: needs-triage
2806+
2807+Patches_percona-xtradb-cluster-5.5:
2808+upstream_percona-xtradb-cluster-5.5: needs-triage
2809+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
2810+trusty/esm_percona-xtradb-cluster-5.5: DNE
2811+xenial_percona-xtradb-cluster-5.5: DNE
2812+bionic_percona-xtradb-cluster-5.5: DNE
2813+focal_percona-xtradb-cluster-5.5: DNE
2814+groovy_percona-xtradb-cluster-5.5: DNE
2815+hirsute_percona-xtradb-cluster-5.5: DNE
2816+devel_percona-xtradb-cluster-5.5: DNE
2817+
2818+Patches_percona-xtradb-cluster-5.6:
2819+upstream_percona-xtradb-cluster-5.6: needs-triage
2820+trusty_percona-xtradb-cluster-5.6: DNE
2821+trusty/esm_percona-xtradb-cluster-5.6: DNE
2822+xenial_percona-xtradb-cluster-5.6: needs-triage
2823+bionic_percona-xtradb-cluster-5.6: DNE
2824+focal_percona-xtradb-cluster-5.6: DNE
2825+groovy_percona-xtradb-cluster-5.6: DNE
2826+hirsute_percona-xtradb-cluster-5.6: DNE
2827+devel_percona-xtradb-cluster-5.6: DNE
2828+
2829+Patches_percona-server-5.6:
2830+upstream_percona-server-5.6: needs-triage
2831+trusty_percona-server-5.6: DNE
2832+trusty/esm_percona-server-5.6: DNE
2833+xenial_percona-server-5.6: needs-triage
2834+bionic_percona-server-5.6: DNE
2835+focal_percona-server-5.6: DNE
2836+groovy_percona-server-5.6: DNE
2837+hirsute_percona-server-5.6: DNE
2838+devel_percona-server-5.6: DNE
2839diff --git a/active/CVE-2021-2387 b/active/CVE-2021-2387
2840new file mode 100644
2841index 0000000..24ac32a
2842--- /dev/null
2843+++ b/active/CVE-2021-2387
2844@@ -0,0 +1,158 @@
2845+Candidate: CVE-2021-2387
2846+PublicDate: 2021-07-21 15:15:00 UTC
2847+References:
2848+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387
2849+ https://www.oracle.com/security-alerts/cpujul2021.html
2850+Description:
2851+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
2852+ Server: Optimizer). Supported versions that are affected are 8.0.25 and
2853+ prior. Easily exploitable vulnerability allows high privileged attacker
2854+ with network access via multiple protocols to compromise MySQL Server.
2855+ Successful attacks of this vulnerability can result in unauthorized ability
2856+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
2857+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
2858+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
2859+Ubuntu-Description:
2860+Notes:
2861+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
2862+ patch it, marking it as ignored.
2863+Mitigation:
2864+Bugs:
2865+Priority: medium
2866+Discovered-by:
2867+Assigned-to:
2868+CVSS:
2869+
2870+Patches_mysql-5.5:
2871+upstream_mysql-5.5: needs-triage
2872+trusty_mysql-5.5: ignored (out of standard support)
2873+trusty/esm_mysql-5.5: ignored
2874+vivid_mysql-5.5: DNE
2875+xenial_mysql-5.5: DNE
2876+bionic_mysql-5.5: DNE
2877+focal_mysql-5.5: DNE
2878+groovy_mysql-5.5: DNE
2879+hirsute_mysql-5.5: DNE
2880+devel_mysql-5.5: DNE
2881+
2882+Patches_mysql-5.6:
2883+upstream_mysql-5.6: needs-triage
2884+trusty_mysql-5.6: ignored (out of standard support)
2885+trusty/esm_mysql-5.6: DNE
2886+xenial_mysql-5.6: DNE
2887+bionic_mysql-5.6: DNE
2888+focal_mysql-5.6: DNE
2889+groovy_mysql-5.6: DNE
2890+hirsute_mysql-5.6: DNE
2891+devel_mysql-5.6: DNE
2892+
2893+Patches_mysql-5.7:
2894+upstream_mysql-5.7: needs-triage
2895+trusty_mysql-5.7: DNE
2896+trusty/esm_mysql-5.7: DNE
2897+xenial_mysql-5.7: needs-triage
2898+esm-infra/xenial_mysql-5.7: needs-triage
2899+bionic_mysql-5.7: needs-triage
2900+focal_mysql-5.7: DNE
2901+groovy_mysql-5.7: DNE
2902+hirsute_mysql-5.7: DNE
2903+devel_mysql-5.7: DNE
2904+
2905+Patches_mysql-8.0:
2906+upstream_mysql-8.0: needs-triage
2907+trusty_mysql-8.0: DNE
2908+trusty/esm_mysql-8.0: DNE
2909+xenial_mysql-8.0: DNE
2910+bionic_mysql-8.0: DNE
2911+focal_mysql-8.0: needs-triage
2912+groovy_mysql-8.0: needs-triage
2913+hirsute_mysql-8.0: needs-triage
2914+devel_mysql-8.0: needs-triage
2915+
2916+Patches_mariadb-5.5:
2917+upstream_mariadb-5.5: needs-triage
2918+trusty_mariadb-5.5: ignored (out of standard support)
2919+trusty/esm_mariadb-5.5: DNE
2920+xenial_mariadb-5.5: DNE
2921+bionic_mariadb-5.5: DNE
2922+focal_mariadb-5.5: DNE
2923+groovy_mariadb-5.5: DNE
2924+hirsute_mariadb-5.5: DNE
2925+devel_mariadb-5.5: DNE
2926+
2927+Patches_mariadb-10.0:
2928+upstream_mariadb-10.0: needs-triage
2929+trusty_mariadb-10.0: DNE
2930+trusty/esm_mariadb-10.0: DNE
2931+xenial_mariadb-10.0: needs-triage
2932+bionic_mariadb-10.0: DNE
2933+focal_mariadb-10.0: DNE
2934+groovy_mariadb-10.0: DNE
2935+hirsute_mariadb-10.0: DNE
2936+devel_mariadb-10.0: DNE
2937+
2938+Patches_mariadb-10.1:
2939+upstream_mariadb-10.1: needs-triage
2940+trusty_mariadb-10.1: DNE
2941+trusty/esm_mariadb-10.1: DNE
2942+xenial_mariadb-10.1: DNE
2943+bionic_mariadb-10.1: needs-triage
2944+focal_mariadb-10.1: DNE
2945+groovy_mariadb-10.1: DNE
2946+hirsute_mariadb-10.1: DNE
2947+devel_mariadb-10.1: DNE
2948+
2949+Patches_mariadb-10.3:
2950+upstream_mariadb-10.3: needs-triage
2951+trusty_mariadb-10.3: DNE
2952+trusty/esm_mariadb-10.3: DNE
2953+xenial_mariadb-10.3: DNE
2954+bionic_mariadb-10.3: DNE
2955+focal_mariadb-10.3: needs-triage
2956+groovy_mariadb-10.3: needs-triage
2957+hirsute_mariadb-10.3: DNE
2958+devel_mariadb-10.3: DNE
2959+
2960+Patches_mariadb-10.5:
2961+upstream_mariadb-10.5: needs-triage
2962+trusty_mariadb-10.5: DNE
2963+trusty/esm_mariadb-10.5: DNE
2964+xenial_mariadb-10.5: DNE
2965+bionic_mariadb-10.5: DNE
2966+focal_mariadb-10.5: DNE
2967+groovy_mariadb-10.5: DNE
2968+hirsute_mariadb-10.5: needs-triage
2969+devel_mariadb-10.5: needs-triage
2970+
2971+Patches_percona-xtradb-cluster-5.5:
2972+upstream_percona-xtradb-cluster-5.5: needs-triage
2973+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
2974+trusty/esm_percona-xtradb-cluster-5.5: DNE
2975+xenial_percona-xtradb-cluster-5.5: DNE
2976+bionic_percona-xtradb-cluster-5.5: DNE
2977+focal_percona-xtradb-cluster-5.5: DNE
2978+groovy_percona-xtradb-cluster-5.5: DNE
2979+hirsute_percona-xtradb-cluster-5.5: DNE
2980+devel_percona-xtradb-cluster-5.5: DNE
2981+
2982+Patches_percona-xtradb-cluster-5.6:
2983+upstream_percona-xtradb-cluster-5.6: needs-triage
2984+trusty_percona-xtradb-cluster-5.6: DNE
2985+trusty/esm_percona-xtradb-cluster-5.6: DNE
2986+xenial_percona-xtradb-cluster-5.6: needs-triage
2987+bionic_percona-xtradb-cluster-5.6: DNE
2988+focal_percona-xtradb-cluster-5.6: DNE
2989+groovy_percona-xtradb-cluster-5.6: DNE
2990+hirsute_percona-xtradb-cluster-5.6: DNE
2991+devel_percona-xtradb-cluster-5.6: DNE
2992+
2993+Patches_percona-server-5.6:
2994+upstream_percona-server-5.6: needs-triage
2995+trusty_percona-server-5.6: DNE
2996+trusty/esm_percona-server-5.6: DNE
2997+xenial_percona-server-5.6: needs-triage
2998+bionic_percona-server-5.6: DNE
2999+focal_percona-server-5.6: DNE
3000+groovy_percona-server-5.6: DNE
3001+hirsute_percona-server-5.6: DNE
3002+devel_percona-server-5.6: DNE
3003diff --git a/active/CVE-2021-2388 b/active/CVE-2021-2388
3004new file mode 100644
3005index 0000000..7ddfb99
3006--- /dev/null
3007+++ b/active/CVE-2021-2388
3008@@ -0,0 +1,120 @@
3009+Candidate: CVE-2021-2388
3010+PublicDate: 2021-07-21 15:15:00 UTC
3011+References:
3012+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
3013+ https://www.oracle.com/security-alerts/cpujul2021.html
3014+Description:
3015+ Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of
3016+ Oracle Java SE (component: Hotspot). Supported versions that are affected
3017+ are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition:
3018+ 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows
3019+ unauthenticated attacker with network access via multiple protocols to
3020+ compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks
3021+ require human interaction from a person other than the attacker. Successful
3022+ attacks of this vulnerability can result in takeover of Java SE, Oracle
3023+ GraalVM Enterprise Edition. Note: This vulnerability applies to Java
3024+ deployments, typically in clients running sandboxed Java Web Start
3025+ applications or sandboxed Java applets, that load and run untrusted code
3026+ (e.g., code that comes from the internet) and rely on the Java sandbox for
3027+ security. This vulnerability does not apply to Java deployments, typically
3028+ in servers, that load and run only trusted code (e.g., code installed by an
3029+ administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and
3030+ Availability impacts). CVSS Vector:
3031+ (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
3032+Ubuntu-Description:
3033+Notes:
3034+Mitigation:
3035+Bugs:
3036+Priority: medium
3037+Discovered-by:
3038+Assigned-to:
3039+CVSS:
3040+
3041+Patches_openjdk-8:
3042+upstream_openjdk-8: needs-triage
3043+trusty_openjdk-8: DNE
3044+trusty/esm_openjdk-8: DNE
3045+xenial_openjdk-8: needs-triage
3046+esm-infra/xenial_openjdk-8: needs-triage
3047+bionic_openjdk-8: needs-triage
3048+focal_openjdk-8: needs-triage
3049+groovy_openjdk-8: needs-triage
3050+hirsute_openjdk-8: needs-triage
3051+devel_openjdk-8: needs-triage
3052+
3053+Patches_icedtea-web:
3054+upstream_icedtea-web: needs-triage
3055+trusty_icedtea-web: ignored (out of standard support)
3056+trusty/esm_icedtea-web: DNE
3057+xenial_icedtea-web: needs-triage
3058+bionic_icedtea-web: needs-triage
3059+focal_icedtea-web: needs-triage
3060+groovy_icedtea-web: needs-triage
3061+hirsute_icedtea-web: needs-triage
3062+devel_icedtea-web: needs-triage
3063+
3064+Patches_openjdk-9:
3065+upstream_openjdk-9: needs-triage
3066+trusty_openjdk-9: DNE
3067+trusty/esm_openjdk-9: DNE
3068+xenial_openjdk-9: needs-triage
3069+bionic_openjdk-9: DNE
3070+focal_openjdk-9: DNE
3071+groovy_openjdk-9: DNE
3072+hirsute_openjdk-9: DNE
3073+devel_openjdk-9: DNE
3074+
3075+Patches_openjdk-lts:
3076+upstream_openjdk-lts: needs-triage
3077+trusty_openjdk-lts: DNE
3078+trusty/esm_openjdk-lts: DNE
3079+xenial_openjdk-lts: DNE
3080+bionic_openjdk-lts: needs-triage
3081+focal_openjdk-lts: needs-triage
3082+groovy_openjdk-lts: needs-triage
3083+hirsute_openjdk-lts: needs-triage
3084+devel_openjdk-lts: needs-triage
3085+
3086+Patches_openjdk-12:
3087+upstream_openjdk-12: needs-triage
3088+trusty_openjdk-12: DNE
3089+trusty/esm_openjdk-12: DNE
3090+xenial_openjdk-12: DNE
3091+bionic_openjdk-12: DNE
3092+focal_openjdk-12: DNE
3093+groovy_openjdk-12: DNE
3094+hirsute_openjdk-12: DNE
3095+devel_openjdk-12: DNE
3096+
3097+Patches_openjdk-13:
3098+upstream_openjdk-13: needs-triage
3099+trusty_openjdk-13: DNE
3100+trusty/esm_openjdk-13: DNE
3101+xenial_openjdk-13: DNE
3102+bionic_openjdk-13: DNE
3103+focal_openjdk-13: needs-triage
3104+groovy_openjdk-13: needs-triage
3105+hirsute_openjdk-13: DNE
3106+devel_openjdk-13: DNE
3107+
3108+Patches_openjdk-14:
3109+upstream_openjdk-14: needs-triage
3110+trusty_openjdk-14: DNE
3111+trusty/esm_openjdk-14: DNE
3112+xenial_openjdk-14: DNE
3113+bionic_openjdk-14: DNE
3114+focal_openjdk-14: needs-triage
3115+groovy_openjdk-14: needs-triage
3116+hirsute_openjdk-14: DNE
3117+devel_openjdk-14: DNE
3118+
3119+Patches_openjdk-15:
3120+upstream_openjdk-15: needs-triage
3121+trusty_openjdk-15: DNE
3122+trusty/esm_openjdk-15: DNE
3123+xenial_openjdk-15: DNE
3124+bionic_openjdk-15: DNE
3125+focal_openjdk-15: DNE
3126+groovy_openjdk-15: needs-triage
3127+hirsute_openjdk-15: needs-triage
3128+devel_openjdk-15: needs-triage
3129diff --git a/active/CVE-2021-2389 b/active/CVE-2021-2389
3130new file mode 100644
3131index 0000000..6c667b9
3132--- /dev/null
3133+++ b/active/CVE-2021-2389
3134@@ -0,0 +1,158 @@
3135+Candidate: CVE-2021-2389
3136+PublicDate: 2021-07-21 15:15:00 UTC
3137+References:
3138+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
3139+ https://www.oracle.com/security-alerts/cpujul2021.html
3140+Description:
3141+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
3142+ InnoDB). Supported versions that are affected are 5.7.34 and prior and
3143+ 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated
3144+ attacker with network access via multiple protocols to compromise MySQL
3145+ Server. Successful attacks of this vulnerability can result in unauthorized
3146+ ability to cause a hang or frequently repeatable crash (complete DOS) of
3147+ MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector:
3148+ (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
3149+Ubuntu-Description:
3150+Notes:
3151+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
3152+ patch it, marking it as ignored.
3153+Mitigation:
3154+Bugs:
3155+Priority: medium
3156+Discovered-by:
3157+Assigned-to:
3158+CVSS:
3159+
3160+Patches_mysql-5.5:
3161+upstream_mysql-5.5: needs-triage
3162+trusty_mysql-5.5: ignored (out of standard support)
3163+trusty/esm_mysql-5.5: ignored
3164+vivid_mysql-5.5: DNE
3165+xenial_mysql-5.5: DNE
3166+bionic_mysql-5.5: DNE
3167+focal_mysql-5.5: DNE
3168+groovy_mysql-5.5: DNE
3169+hirsute_mysql-5.5: DNE
3170+devel_mysql-5.5: DNE
3171+
3172+Patches_mysql-5.6:
3173+upstream_mysql-5.6: needs-triage
3174+trusty_mysql-5.6: ignored (out of standard support)
3175+trusty/esm_mysql-5.6: DNE
3176+xenial_mysql-5.6: DNE
3177+bionic_mysql-5.6: DNE
3178+focal_mysql-5.6: DNE
3179+groovy_mysql-5.6: DNE
3180+hirsute_mysql-5.6: DNE
3181+devel_mysql-5.6: DNE
3182+
3183+Patches_mysql-5.7:
3184+upstream_mysql-5.7: needs-triage
3185+trusty_mysql-5.7: DNE
3186+trusty/esm_mysql-5.7: DNE
3187+xenial_mysql-5.7: needs-triage
3188+esm-infra/xenial_mysql-5.7: needs-triage
3189+bionic_mysql-5.7: needs-triage
3190+focal_mysql-5.7: DNE
3191+groovy_mysql-5.7: DNE
3192+hirsute_mysql-5.7: DNE
3193+devel_mysql-5.7: DNE
3194+
3195+Patches_mysql-8.0:
3196+upstream_mysql-8.0: needs-triage
3197+trusty_mysql-8.0: DNE
3198+trusty/esm_mysql-8.0: DNE
3199+xenial_mysql-8.0: DNE
3200+bionic_mysql-8.0: DNE
3201+focal_mysql-8.0: needs-triage
3202+groovy_mysql-8.0: needs-triage
3203+hirsute_mysql-8.0: needs-triage
3204+devel_mysql-8.0: needs-triage
3205+
3206+Patches_mariadb-5.5:
3207+upstream_mariadb-5.5: needs-triage
3208+trusty_mariadb-5.5: ignored (out of standard support)
3209+trusty/esm_mariadb-5.5: DNE
3210+xenial_mariadb-5.5: DNE
3211+bionic_mariadb-5.5: DNE
3212+focal_mariadb-5.5: DNE
3213+groovy_mariadb-5.5: DNE
3214+hirsute_mariadb-5.5: DNE
3215+devel_mariadb-5.5: DNE
3216+
3217+Patches_mariadb-10.0:
3218+upstream_mariadb-10.0: needs-triage
3219+trusty_mariadb-10.0: DNE
3220+trusty/esm_mariadb-10.0: DNE
3221+xenial_mariadb-10.0: needs-triage
3222+bionic_mariadb-10.0: DNE
3223+focal_mariadb-10.0: DNE
3224+groovy_mariadb-10.0: DNE
3225+hirsute_mariadb-10.0: DNE
3226+devel_mariadb-10.0: DNE
3227+
3228+Patches_mariadb-10.1:
3229+upstream_mariadb-10.1: needs-triage
3230+trusty_mariadb-10.1: DNE
3231+trusty/esm_mariadb-10.1: DNE
3232+xenial_mariadb-10.1: DNE
3233+bionic_mariadb-10.1: needs-triage
3234+focal_mariadb-10.1: DNE
3235+groovy_mariadb-10.1: DNE
3236+hirsute_mariadb-10.1: DNE
3237+devel_mariadb-10.1: DNE
3238+
3239+Patches_mariadb-10.3:
3240+upstream_mariadb-10.3: needs-triage
3241+trusty_mariadb-10.3: DNE
3242+trusty/esm_mariadb-10.3: DNE
3243+xenial_mariadb-10.3: DNE
3244+bionic_mariadb-10.3: DNE
3245+focal_mariadb-10.3: needs-triage
3246+groovy_mariadb-10.3: needs-triage
3247+hirsute_mariadb-10.3: DNE
3248+devel_mariadb-10.3: DNE
3249+
3250+Patches_mariadb-10.5:
3251+upstream_mariadb-10.5: needs-triage
3252+trusty_mariadb-10.5: DNE
3253+trusty/esm_mariadb-10.5: DNE
3254+xenial_mariadb-10.5: DNE
3255+bionic_mariadb-10.5: DNE
3256+focal_mariadb-10.5: DNE
3257+groovy_mariadb-10.5: DNE
3258+hirsute_mariadb-10.5: needs-triage
3259+devel_mariadb-10.5: needs-triage
3260+
3261+Patches_percona-xtradb-cluster-5.5:
3262+upstream_percona-xtradb-cluster-5.5: needs-triage
3263+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
3264+trusty/esm_percona-xtradb-cluster-5.5: DNE
3265+xenial_percona-xtradb-cluster-5.5: DNE
3266+bionic_percona-xtradb-cluster-5.5: DNE
3267+focal_percona-xtradb-cluster-5.5: DNE
3268+groovy_percona-xtradb-cluster-5.5: DNE
3269+hirsute_percona-xtradb-cluster-5.5: DNE
3270+devel_percona-xtradb-cluster-5.5: DNE
3271+
3272+Patches_percona-xtradb-cluster-5.6:
3273+upstream_percona-xtradb-cluster-5.6: needs-triage
3274+trusty_percona-xtradb-cluster-5.6: DNE
3275+trusty/esm_percona-xtradb-cluster-5.6: DNE
3276+xenial_percona-xtradb-cluster-5.6: needs-triage
3277+bionic_percona-xtradb-cluster-5.6: DNE
3278+focal_percona-xtradb-cluster-5.6: DNE
3279+groovy_percona-xtradb-cluster-5.6: DNE
3280+hirsute_percona-xtradb-cluster-5.6: DNE
3281+devel_percona-xtradb-cluster-5.6: DNE
3282+
3283+Patches_percona-server-5.6:
3284+upstream_percona-server-5.6: needs-triage
3285+trusty_percona-server-5.6: DNE
3286+trusty/esm_percona-server-5.6: DNE
3287+xenial_percona-server-5.6: needs-triage
3288+bionic_percona-server-5.6: DNE
3289+focal_percona-server-5.6: DNE
3290+groovy_percona-server-5.6: DNE
3291+hirsute_percona-server-5.6: DNE
3292+devel_percona-server-5.6: DNE
3293diff --git a/active/CVE-2021-2390 b/active/CVE-2021-2390
3294new file mode 100644
3295index 0000000..8f8f4bc
3296--- /dev/null
3297+++ b/active/CVE-2021-2390
3298@@ -0,0 +1,158 @@
3299+Candidate: CVE-2021-2390
3300+PublicDate: 2021-07-21 15:15:00 UTC
3301+References:
3302+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390
3303+ https://www.oracle.com/security-alerts/cpujul2021.html
3304+Description:
3305+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
3306+ InnoDB). Supported versions that are affected are 5.7.34 and prior and
3307+ 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated
3308+ attacker with network access via multiple protocols to compromise MySQL
3309+ Server. Successful attacks of this vulnerability can result in unauthorized
3310+ ability to cause a hang or frequently repeatable crash (complete DOS) of
3311+ MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector:
3312+ (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
3313+Ubuntu-Description:
3314+Notes:
3315+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
3316+ patch it, marking it as ignored.
3317+Mitigation:
3318+Bugs:
3319+Priority: medium
3320+Discovered-by:
3321+Assigned-to:
3322+CVSS:
3323+
3324+Patches_mysql-5.5:
3325+upstream_mysql-5.5: needs-triage
3326+trusty_mysql-5.5: ignored (out of standard support)
3327+trusty/esm_mysql-5.5: ignored
3328+vivid_mysql-5.5: DNE
3329+xenial_mysql-5.5: DNE
3330+bionic_mysql-5.5: DNE
3331+focal_mysql-5.5: DNE
3332+groovy_mysql-5.5: DNE
3333+hirsute_mysql-5.5: DNE
3334+devel_mysql-5.5: DNE
3335+
3336+Patches_mysql-5.6:
3337+upstream_mysql-5.6: needs-triage
3338+trusty_mysql-5.6: ignored (out of standard support)
3339+trusty/esm_mysql-5.6: DNE
3340+xenial_mysql-5.6: DNE
3341+bionic_mysql-5.6: DNE
3342+focal_mysql-5.6: DNE
3343+groovy_mysql-5.6: DNE
3344+hirsute_mysql-5.6: DNE
3345+devel_mysql-5.6: DNE
3346+
3347+Patches_mysql-5.7:
3348+upstream_mysql-5.7: needs-triage
3349+trusty_mysql-5.7: DNE
3350+trusty/esm_mysql-5.7: DNE
3351+xenial_mysql-5.7: needs-triage
3352+esm-infra/xenial_mysql-5.7: needs-triage
3353+bionic_mysql-5.7: needs-triage
3354+focal_mysql-5.7: DNE
3355+groovy_mysql-5.7: DNE
3356+hirsute_mysql-5.7: DNE
3357+devel_mysql-5.7: DNE
3358+
3359+Patches_mysql-8.0:
3360+upstream_mysql-8.0: needs-triage
3361+trusty_mysql-8.0: DNE
3362+trusty/esm_mysql-8.0: DNE
3363+xenial_mysql-8.0: DNE
3364+bionic_mysql-8.0: DNE
3365+focal_mysql-8.0: needs-triage
3366+groovy_mysql-8.0: needs-triage
3367+hirsute_mysql-8.0: needs-triage
3368+devel_mysql-8.0: needs-triage
3369+
3370+Patches_mariadb-5.5:
3371+upstream_mariadb-5.5: needs-triage
3372+trusty_mariadb-5.5: ignored (out of standard support)
3373+trusty/esm_mariadb-5.5: DNE
3374+xenial_mariadb-5.5: DNE
3375+bionic_mariadb-5.5: DNE
3376+focal_mariadb-5.5: DNE
3377+groovy_mariadb-5.5: DNE
3378+hirsute_mariadb-5.5: DNE
3379+devel_mariadb-5.5: DNE
3380+
3381+Patches_mariadb-10.0:
3382+upstream_mariadb-10.0: needs-triage
3383+trusty_mariadb-10.0: DNE
3384+trusty/esm_mariadb-10.0: DNE
3385+xenial_mariadb-10.0: needs-triage
3386+bionic_mariadb-10.0: DNE
3387+focal_mariadb-10.0: DNE
3388+groovy_mariadb-10.0: DNE
3389+hirsute_mariadb-10.0: DNE
3390+devel_mariadb-10.0: DNE
3391+
3392+Patches_mariadb-10.1:
3393+upstream_mariadb-10.1: needs-triage
3394+trusty_mariadb-10.1: DNE
3395+trusty/esm_mariadb-10.1: DNE
3396+xenial_mariadb-10.1: DNE
3397+bionic_mariadb-10.1: needs-triage
3398+focal_mariadb-10.1: DNE
3399+groovy_mariadb-10.1: DNE
3400+hirsute_mariadb-10.1: DNE
3401+devel_mariadb-10.1: DNE
3402+
3403+Patches_mariadb-10.3:
3404+upstream_mariadb-10.3: needs-triage
3405+trusty_mariadb-10.3: DNE
3406+trusty/esm_mariadb-10.3: DNE
3407+xenial_mariadb-10.3: DNE
3408+bionic_mariadb-10.3: DNE
3409+focal_mariadb-10.3: needs-triage
3410+groovy_mariadb-10.3: needs-triage
3411+hirsute_mariadb-10.3: DNE
3412+devel_mariadb-10.3: DNE
3413+
3414+Patches_mariadb-10.5:
3415+upstream_mariadb-10.5: needs-triage
3416+trusty_mariadb-10.5: DNE
3417+trusty/esm_mariadb-10.5: DNE
3418+xenial_mariadb-10.5: DNE
3419+bionic_mariadb-10.5: DNE
3420+focal_mariadb-10.5: DNE
3421+groovy_mariadb-10.5: DNE
3422+hirsute_mariadb-10.5: needs-triage
3423+devel_mariadb-10.5: needs-triage
3424+
3425+Patches_percona-xtradb-cluster-5.5:
3426+upstream_percona-xtradb-cluster-5.5: needs-triage
3427+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
3428+trusty/esm_percona-xtradb-cluster-5.5: DNE
3429+xenial_percona-xtradb-cluster-5.5: DNE
3430+bionic_percona-xtradb-cluster-5.5: DNE
3431+focal_percona-xtradb-cluster-5.5: DNE
3432+groovy_percona-xtradb-cluster-5.5: DNE
3433+hirsute_percona-xtradb-cluster-5.5: DNE
3434+devel_percona-xtradb-cluster-5.5: DNE
3435+
3436+Patches_percona-xtradb-cluster-5.6:
3437+upstream_percona-xtradb-cluster-5.6: needs-triage
3438+trusty_percona-xtradb-cluster-5.6: DNE
3439+trusty/esm_percona-xtradb-cluster-5.6: DNE
3440+xenial_percona-xtradb-cluster-5.6: needs-triage
3441+bionic_percona-xtradb-cluster-5.6: DNE
3442+focal_percona-xtradb-cluster-5.6: DNE
3443+groovy_percona-xtradb-cluster-5.6: DNE
3444+hirsute_percona-xtradb-cluster-5.6: DNE
3445+devel_percona-xtradb-cluster-5.6: DNE
3446+
3447+Patches_percona-server-5.6:
3448+upstream_percona-server-5.6: needs-triage
3449+trusty_percona-server-5.6: DNE
3450+trusty/esm_percona-server-5.6: DNE
3451+xenial_percona-server-5.6: needs-triage
3452+bionic_percona-server-5.6: DNE
3453+focal_percona-server-5.6: DNE
3454+groovy_percona-server-5.6: DNE
3455+hirsute_percona-server-5.6: DNE
3456+devel_percona-server-5.6: DNE
3457diff --git a/active/CVE-2021-2399 b/active/CVE-2021-2399
3458new file mode 100644
3459index 0000000..fd7e1de
3460--- /dev/null
3461+++ b/active/CVE-2021-2399
3462@@ -0,0 +1,158 @@
3463+Candidate: CVE-2021-2399
3464+PublicDate: 2021-07-21 15:15:00 UTC
3465+References:
3466+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399
3467+ https://www.oracle.com/security-alerts/cpujul2021.html
3468+Description:
3469+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
3470+ Server: DDL). Supported versions that are affected are 8.0.25 and prior.
3471+ Easily exploitable vulnerability allows high privileged attacker with
3472+ network access via multiple protocols to compromise MySQL Server.
3473+ Successful attacks of this vulnerability can result in unauthorized ability
3474+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
3475+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
3476+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
3477+Ubuntu-Description:
3478+Notes:
3479+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
3480+ patch it, marking it as ignored.
3481+Mitigation:
3482+Bugs:
3483+Priority: medium
3484+Discovered-by:
3485+Assigned-to:
3486+CVSS:
3487+
3488+Patches_mysql-5.5:
3489+upstream_mysql-5.5: needs-triage
3490+trusty_mysql-5.5: ignored (out of standard support)
3491+trusty/esm_mysql-5.5: ignored
3492+vivid_mysql-5.5: DNE
3493+xenial_mysql-5.5: DNE
3494+bionic_mysql-5.5: DNE
3495+focal_mysql-5.5: DNE
3496+groovy_mysql-5.5: DNE
3497+hirsute_mysql-5.5: DNE
3498+devel_mysql-5.5: DNE
3499+
3500+Patches_mysql-5.6:
3501+upstream_mysql-5.6: needs-triage
3502+trusty_mysql-5.6: ignored (out of standard support)
3503+trusty/esm_mysql-5.6: DNE
3504+xenial_mysql-5.6: DNE
3505+bionic_mysql-5.6: DNE
3506+focal_mysql-5.6: DNE
3507+groovy_mysql-5.6: DNE
3508+hirsute_mysql-5.6: DNE
3509+devel_mysql-5.6: DNE
3510+
3511+Patches_mysql-5.7:
3512+upstream_mysql-5.7: needs-triage
3513+trusty_mysql-5.7: DNE
3514+trusty/esm_mysql-5.7: DNE
3515+xenial_mysql-5.7: needs-triage
3516+esm-infra/xenial_mysql-5.7: needs-triage
3517+bionic_mysql-5.7: needs-triage
3518+focal_mysql-5.7: DNE
3519+groovy_mysql-5.7: DNE
3520+hirsute_mysql-5.7: DNE
3521+devel_mysql-5.7: DNE
3522+
3523+Patches_mysql-8.0:
3524+upstream_mysql-8.0: needs-triage
3525+trusty_mysql-8.0: DNE
3526+trusty/esm_mysql-8.0: DNE
3527+xenial_mysql-8.0: DNE
3528+bionic_mysql-8.0: DNE
3529+focal_mysql-8.0: needs-triage
3530+groovy_mysql-8.0: needs-triage
3531+hirsute_mysql-8.0: needs-triage
3532+devel_mysql-8.0: needs-triage
3533+
3534+Patches_mariadb-5.5:
3535+upstream_mariadb-5.5: needs-triage
3536+trusty_mariadb-5.5: ignored (out of standard support)
3537+trusty/esm_mariadb-5.5: DNE
3538+xenial_mariadb-5.5: DNE
3539+bionic_mariadb-5.5: DNE
3540+focal_mariadb-5.5: DNE
3541+groovy_mariadb-5.5: DNE
3542+hirsute_mariadb-5.5: DNE
3543+devel_mariadb-5.5: DNE
3544+
3545+Patches_mariadb-10.0:
3546+upstream_mariadb-10.0: needs-triage
3547+trusty_mariadb-10.0: DNE
3548+trusty/esm_mariadb-10.0: DNE
3549+xenial_mariadb-10.0: needs-triage
3550+bionic_mariadb-10.0: DNE
3551+focal_mariadb-10.0: DNE
3552+groovy_mariadb-10.0: DNE
3553+hirsute_mariadb-10.0: DNE
3554+devel_mariadb-10.0: DNE
3555+
3556+Patches_mariadb-10.1:
3557+upstream_mariadb-10.1: needs-triage
3558+trusty_mariadb-10.1: DNE
3559+trusty/esm_mariadb-10.1: DNE
3560+xenial_mariadb-10.1: DNE
3561+bionic_mariadb-10.1: needs-triage
3562+focal_mariadb-10.1: DNE
3563+groovy_mariadb-10.1: DNE
3564+hirsute_mariadb-10.1: DNE
3565+devel_mariadb-10.1: DNE
3566+
3567+Patches_mariadb-10.3:
3568+upstream_mariadb-10.3: needs-triage
3569+trusty_mariadb-10.3: DNE
3570+trusty/esm_mariadb-10.3: DNE
3571+xenial_mariadb-10.3: DNE
3572+bionic_mariadb-10.3: DNE
3573+focal_mariadb-10.3: needs-triage
3574+groovy_mariadb-10.3: needs-triage
3575+hirsute_mariadb-10.3: DNE
3576+devel_mariadb-10.3: DNE
3577+
3578+Patches_mariadb-10.5:
3579+upstream_mariadb-10.5: needs-triage
3580+trusty_mariadb-10.5: DNE
3581+trusty/esm_mariadb-10.5: DNE
3582+xenial_mariadb-10.5: DNE
3583+bionic_mariadb-10.5: DNE
3584+focal_mariadb-10.5: DNE
3585+groovy_mariadb-10.5: DNE
3586+hirsute_mariadb-10.5: needs-triage
3587+devel_mariadb-10.5: needs-triage
3588+
3589+Patches_percona-xtradb-cluster-5.5:
3590+upstream_percona-xtradb-cluster-5.5: needs-triage
3591+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
3592+trusty/esm_percona-xtradb-cluster-5.5: DNE
3593+xenial_percona-xtradb-cluster-5.5: DNE
3594+bionic_percona-xtradb-cluster-5.5: DNE
3595+focal_percona-xtradb-cluster-5.5: DNE
3596+groovy_percona-xtradb-cluster-5.5: DNE
3597+hirsute_percona-xtradb-cluster-5.5: DNE
3598+devel_percona-xtradb-cluster-5.5: DNE
3599+
3600+Patches_percona-xtradb-cluster-5.6:
3601+upstream_percona-xtradb-cluster-5.6: needs-triage
3602+trusty_percona-xtradb-cluster-5.6: DNE
3603+trusty/esm_percona-xtradb-cluster-5.6: DNE
3604+xenial_percona-xtradb-cluster-5.6: needs-triage
3605+bionic_percona-xtradb-cluster-5.6: DNE
3606+focal_percona-xtradb-cluster-5.6: DNE
3607+groovy_percona-xtradb-cluster-5.6: DNE
3608+hirsute_percona-xtradb-cluster-5.6: DNE
3609+devel_percona-xtradb-cluster-5.6: DNE
3610+
3611+Patches_percona-server-5.6:
3612+upstream_percona-server-5.6: needs-triage
3613+trusty_percona-server-5.6: DNE
3614+trusty/esm_percona-server-5.6: DNE
3615+xenial_percona-server-5.6: needs-triage
3616+bionic_percona-server-5.6: DNE
3617+focal_percona-server-5.6: DNE
3618+groovy_percona-server-5.6: DNE
3619+hirsute_percona-server-5.6: DNE
3620+devel_percona-server-5.6: DNE
3621diff --git a/active/CVE-2021-2402 b/active/CVE-2021-2402
3622new file mode 100644
3623index 0000000..5a19a66
3624--- /dev/null
3625+++ b/active/CVE-2021-2402
3626@@ -0,0 +1,158 @@
3627+Candidate: CVE-2021-2402
3628+PublicDate: 2021-07-21 15:15:00 UTC
3629+References:
3630+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402
3631+ https://www.oracle.com/security-alerts/cpujul2021.html
3632+Description:
3633+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
3634+ Server: Locking). Supported versions that are affected are 8.0.25 and
3635+ prior. Easily exploitable vulnerability allows high privileged attacker
3636+ with network access via multiple protocols to compromise MySQL Server.
3637+ Successful attacks of this vulnerability can result in unauthorized ability
3638+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
3639+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
3640+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
3641+Ubuntu-Description:
3642+Notes:
3643+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
3644+ patch it, marking it as ignored.
3645+Mitigation:
3646+Bugs:
3647+Priority: medium
3648+Discovered-by:
3649+Assigned-to:
3650+CVSS:
3651+
3652+Patches_mysql-5.5:
3653+upstream_mysql-5.5: needs-triage
3654+trusty_mysql-5.5: ignored (out of standard support)
3655+trusty/esm_mysql-5.5: ignored
3656+vivid_mysql-5.5: DNE
3657+xenial_mysql-5.5: DNE
3658+bionic_mysql-5.5: DNE
3659+focal_mysql-5.5: DNE
3660+groovy_mysql-5.5: DNE
3661+hirsute_mysql-5.5: DNE
3662+devel_mysql-5.5: DNE
3663+
3664+Patches_mysql-5.6:
3665+upstream_mysql-5.6: needs-triage
3666+trusty_mysql-5.6: ignored (out of standard support)
3667+trusty/esm_mysql-5.6: DNE
3668+xenial_mysql-5.6: DNE
3669+bionic_mysql-5.6: DNE
3670+focal_mysql-5.6: DNE
3671+groovy_mysql-5.6: DNE
3672+hirsute_mysql-5.6: DNE
3673+devel_mysql-5.6: DNE
3674+
3675+Patches_mysql-5.7:
3676+upstream_mysql-5.7: needs-triage
3677+trusty_mysql-5.7: DNE
3678+trusty/esm_mysql-5.7: DNE
3679+xenial_mysql-5.7: needs-triage
3680+esm-infra/xenial_mysql-5.7: needs-triage
3681+bionic_mysql-5.7: needs-triage
3682+focal_mysql-5.7: DNE
3683+groovy_mysql-5.7: DNE
3684+hirsute_mysql-5.7: DNE
3685+devel_mysql-5.7: DNE
3686+
3687+Patches_mysql-8.0:
3688+upstream_mysql-8.0: needs-triage
3689+trusty_mysql-8.0: DNE
3690+trusty/esm_mysql-8.0: DNE
3691+xenial_mysql-8.0: DNE
3692+bionic_mysql-8.0: DNE
3693+focal_mysql-8.0: needs-triage
3694+groovy_mysql-8.0: needs-triage
3695+hirsute_mysql-8.0: needs-triage
3696+devel_mysql-8.0: needs-triage
3697+
3698+Patches_mariadb-5.5:
3699+upstream_mariadb-5.5: needs-triage
3700+trusty_mariadb-5.5: ignored (out of standard support)
3701+trusty/esm_mariadb-5.5: DNE
3702+xenial_mariadb-5.5: DNE
3703+bionic_mariadb-5.5: DNE
3704+focal_mariadb-5.5: DNE
3705+groovy_mariadb-5.5: DNE
3706+hirsute_mariadb-5.5: DNE
3707+devel_mariadb-5.5: DNE
3708+
3709+Patches_mariadb-10.0:
3710+upstream_mariadb-10.0: needs-triage
3711+trusty_mariadb-10.0: DNE
3712+trusty/esm_mariadb-10.0: DNE
3713+xenial_mariadb-10.0: needs-triage
3714+bionic_mariadb-10.0: DNE
3715+focal_mariadb-10.0: DNE
3716+groovy_mariadb-10.0: DNE
3717+hirsute_mariadb-10.0: DNE
3718+devel_mariadb-10.0: DNE
3719+
3720+Patches_mariadb-10.1:
3721+upstream_mariadb-10.1: needs-triage
3722+trusty_mariadb-10.1: DNE
3723+trusty/esm_mariadb-10.1: DNE
3724+xenial_mariadb-10.1: DNE
3725+bionic_mariadb-10.1: needs-triage
3726+focal_mariadb-10.1: DNE
3727+groovy_mariadb-10.1: DNE
3728+hirsute_mariadb-10.1: DNE
3729+devel_mariadb-10.1: DNE
3730+
3731+Patches_mariadb-10.3:
3732+upstream_mariadb-10.3: needs-triage
3733+trusty_mariadb-10.3: DNE
3734+trusty/esm_mariadb-10.3: DNE
3735+xenial_mariadb-10.3: DNE
3736+bionic_mariadb-10.3: DNE
3737+focal_mariadb-10.3: needs-triage
3738+groovy_mariadb-10.3: needs-triage
3739+hirsute_mariadb-10.3: DNE
3740+devel_mariadb-10.3: DNE
3741+
3742+Patches_mariadb-10.5:
3743+upstream_mariadb-10.5: needs-triage
3744+trusty_mariadb-10.5: DNE
3745+trusty/esm_mariadb-10.5: DNE
3746+xenial_mariadb-10.5: DNE
3747+bionic_mariadb-10.5: DNE
3748+focal_mariadb-10.5: DNE
3749+groovy_mariadb-10.5: DNE
3750+hirsute_mariadb-10.5: needs-triage
3751+devel_mariadb-10.5: needs-triage
3752+
3753+Patches_percona-xtradb-cluster-5.5:
3754+upstream_percona-xtradb-cluster-5.5: needs-triage
3755+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
3756+trusty/esm_percona-xtradb-cluster-5.5: DNE
3757+xenial_percona-xtradb-cluster-5.5: DNE
3758+bionic_percona-xtradb-cluster-5.5: DNE
3759+focal_percona-xtradb-cluster-5.5: DNE
3760+groovy_percona-xtradb-cluster-5.5: DNE
3761+hirsute_percona-xtradb-cluster-5.5: DNE
3762+devel_percona-xtradb-cluster-5.5: DNE
3763+
3764+Patches_percona-xtradb-cluster-5.6:
3765+upstream_percona-xtradb-cluster-5.6: needs-triage
3766+trusty_percona-xtradb-cluster-5.6: DNE
3767+trusty/esm_percona-xtradb-cluster-5.6: DNE
3768+xenial_percona-xtradb-cluster-5.6: needs-triage
3769+bionic_percona-xtradb-cluster-5.6: DNE
3770+focal_percona-xtradb-cluster-5.6: DNE
3771+groovy_percona-xtradb-cluster-5.6: DNE
3772+hirsute_percona-xtradb-cluster-5.6: DNE
3773+devel_percona-xtradb-cluster-5.6: DNE
3774+
3775+Patches_percona-server-5.6:
3776+upstream_percona-server-5.6: needs-triage
3777+trusty_percona-server-5.6: DNE
3778+trusty/esm_percona-server-5.6: DNE
3779+xenial_percona-server-5.6: needs-triage
3780+bionic_percona-server-5.6: DNE
3781+focal_percona-server-5.6: DNE
3782+groovy_percona-server-5.6: DNE
3783+hirsute_percona-server-5.6: DNE
3784+devel_percona-server-5.6: DNE
3785diff --git a/active/CVE-2021-2409 b/active/CVE-2021-2409
3786new file mode 100644
3787index 0000000..4cc33f9
3788--- /dev/null
3789+++ b/active/CVE-2021-2409
3790@@ -0,0 +1,37 @@
3791+Candidate: CVE-2021-2409
3792+PublicDate: 2021-07-21 15:15:00 UTC
3793+References:
3794+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2409
3795+ https://www.oracle.com/security-alerts/cpujul2021.html
3796+Description:
3797+ Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
3798+ (component: Core). The supported version that is affected is Prior to
3799+ 6.1.24. Easily exploitable vulnerability allows high privileged attacker
3800+ with logon to the infrastructure where Oracle VM VirtualBox executes to
3801+ compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM
3802+ VirtualBox, attacks may significantly impact additional products.
3803+ Successful attacks of this vulnerability can result in takeover of Oracle
3804+ VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and
3805+ Availability impacts). CVSS Vector:
3806+ (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
3807+Ubuntu-Description:
3808+Notes:
3809+Mitigation:
3810+Bugs:
3811+Priority: medium
3812+Discovered-by:
3813+Assigned-to:
3814+CVSS:
3815+ nvd: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
3816+
3817+
3818+Patches_virtualbox:
3819+upstream_virtualbox: needs-triage
3820+trusty_virtualbox: ignored (out of standard support)
3821+trusty/esm_virtualbox: DNE
3822+xenial_virtualbox: ignored (out of standard support)
3823+bionic_virtualbox: needs-triage
3824+focal_virtualbox: needs-triage
3825+groovy_virtualbox: needs-triage
3826+hirsute_virtualbox: needs-triage
3827+devel_virtualbox: needs-triage
3828diff --git a/active/CVE-2021-2410 b/active/CVE-2021-2410
3829new file mode 100644
3830index 0000000..ac4c194
3831--- /dev/null
3832+++ b/active/CVE-2021-2410
3833@@ -0,0 +1,159 @@
3834+Candidate: CVE-2021-2410
3835+PublicDate: 2021-07-21 15:15:00 UTC
3836+References:
3837+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410
3838+ https://www.oracle.com/security-alerts/cpujul2021.html
3839+Description:
3840+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
3841+ Server: Optimizer). Supported versions that are affected are 8.0.25 and
3842+ prior. Easily exploitable vulnerability allows high privileged attacker
3843+ with network access via multiple protocols to compromise MySQL Server.
3844+ Successful attacks of this vulnerability can result in unauthorized ability
3845+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
3846+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
3847+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
3848+Ubuntu-Description:
3849+Notes:
3850+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
3851+ patch it, marking it as ignored.
3852+Mitigation:
3853+Bugs:
3854+Priority: medium
3855+Discovered-by:
3856+Assigned-to:
3857+CVSS:
3858+ nvd: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
3859+
3860+Patches_mysql-5.5:
3861+upstream_mysql-5.5: needs-triage
3862+trusty_mysql-5.5: ignored (out of standard support)
3863+trusty/esm_mysql-5.5: ignored
3864+vivid_mysql-5.5: DNE
3865+xenial_mysql-5.5: DNE
3866+bionic_mysql-5.5: DNE
3867+focal_mysql-5.5: DNE
3868+groovy_mysql-5.5: DNE
3869+hirsute_mysql-5.5: DNE
3870+devel_mysql-5.5: DNE
3871+
3872+Patches_mysql-5.6:
3873+upstream_mysql-5.6: needs-triage
3874+trusty_mysql-5.6: ignored (out of standard support)
3875+trusty/esm_mysql-5.6: DNE
3876+xenial_mysql-5.6: DNE
3877+bionic_mysql-5.6: DNE
3878+focal_mysql-5.6: DNE
3879+groovy_mysql-5.6: DNE
3880+hirsute_mysql-5.6: DNE
3881+devel_mysql-5.6: DNE
3882+
3883+Patches_mysql-5.7:
3884+upstream_mysql-5.7: needs-triage
3885+trusty_mysql-5.7: DNE
3886+trusty/esm_mysql-5.7: DNE
3887+xenial_mysql-5.7: needs-triage
3888+esm-infra/xenial_mysql-5.7: needs-triage
3889+bionic_mysql-5.7: needs-triage
3890+focal_mysql-5.7: DNE
3891+groovy_mysql-5.7: DNE
3892+hirsute_mysql-5.7: DNE
3893+devel_mysql-5.7: DNE
3894+
3895+Patches_mysql-8.0:
3896+upstream_mysql-8.0: needs-triage
3897+trusty_mysql-8.0: DNE
3898+trusty/esm_mysql-8.0: DNE
3899+xenial_mysql-8.0: DNE
3900+bionic_mysql-8.0: DNE
3901+focal_mysql-8.0: needs-triage
3902+groovy_mysql-8.0: needs-triage
3903+hirsute_mysql-8.0: needs-triage
3904+devel_mysql-8.0: needs-triage
3905+
3906+Patches_mariadb-5.5:
3907+upstream_mariadb-5.5: needs-triage
3908+trusty_mariadb-5.5: ignored (out of standard support)
3909+trusty/esm_mariadb-5.5: DNE
3910+xenial_mariadb-5.5: DNE
3911+bionic_mariadb-5.5: DNE
3912+focal_mariadb-5.5: DNE
3913+groovy_mariadb-5.5: DNE
3914+hirsute_mariadb-5.5: DNE
3915+devel_mariadb-5.5: DNE
3916+
3917+Patches_mariadb-10.0:
3918+upstream_mariadb-10.0: needs-triage
3919+trusty_mariadb-10.0: DNE
3920+trusty/esm_mariadb-10.0: DNE
3921+xenial_mariadb-10.0: needs-triage
3922+bionic_mariadb-10.0: DNE
3923+focal_mariadb-10.0: DNE
3924+groovy_mariadb-10.0: DNE
3925+hirsute_mariadb-10.0: DNE
3926+devel_mariadb-10.0: DNE
3927+
3928+Patches_mariadb-10.1:
3929+upstream_mariadb-10.1: needs-triage
3930+trusty_mariadb-10.1: DNE
3931+trusty/esm_mariadb-10.1: DNE
3932+xenial_mariadb-10.1: DNE
3933+bionic_mariadb-10.1: needs-triage
3934+focal_mariadb-10.1: DNE
3935+groovy_mariadb-10.1: DNE
3936+hirsute_mariadb-10.1: DNE
3937+devel_mariadb-10.1: DNE
3938+
3939+Patches_mariadb-10.3:
3940+upstream_mariadb-10.3: needs-triage
3941+trusty_mariadb-10.3: DNE
3942+trusty/esm_mariadb-10.3: DNE
3943+xenial_mariadb-10.3: DNE
3944+bionic_mariadb-10.3: DNE
3945+focal_mariadb-10.3: needs-triage
3946+groovy_mariadb-10.3: needs-triage
3947+hirsute_mariadb-10.3: DNE
3948+devel_mariadb-10.3: DNE
3949+
3950+Patches_mariadb-10.5:
3951+upstream_mariadb-10.5: needs-triage
3952+trusty_mariadb-10.5: DNE
3953+trusty/esm_mariadb-10.5: DNE
3954+xenial_mariadb-10.5: DNE
3955+bionic_mariadb-10.5: DNE
3956+focal_mariadb-10.5: DNE
3957+groovy_mariadb-10.5: DNE
3958+hirsute_mariadb-10.5: needs-triage
3959+devel_mariadb-10.5: needs-triage
3960+
3961+Patches_percona-xtradb-cluster-5.5:
3962+upstream_percona-xtradb-cluster-5.5: needs-triage
3963+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
3964+trusty/esm_percona-xtradb-cluster-5.5: DNE
3965+xenial_percona-xtradb-cluster-5.5: DNE
3966+bionic_percona-xtradb-cluster-5.5: DNE
3967+focal_percona-xtradb-cluster-5.5: DNE
3968+groovy_percona-xtradb-cluster-5.5: DNE
3969+hirsute_percona-xtradb-cluster-5.5: DNE
3970+devel_percona-xtradb-cluster-5.5: DNE
3971+
3972+Patches_percona-xtradb-cluster-5.6:
3973+upstream_percona-xtradb-cluster-5.6: needs-triage
3974+trusty_percona-xtradb-cluster-5.6: DNE
3975+trusty/esm_percona-xtradb-cluster-5.6: DNE
3976+xenial_percona-xtradb-cluster-5.6: needs-triage
3977+bionic_percona-xtradb-cluster-5.6: DNE
3978+focal_percona-xtradb-cluster-5.6: DNE
3979+groovy_percona-xtradb-cluster-5.6: DNE
3980+hirsute_percona-xtradb-cluster-5.6: DNE
3981+devel_percona-xtradb-cluster-5.6: DNE
3982+
3983+Patches_percona-server-5.6:
3984+upstream_percona-server-5.6: needs-triage
3985+trusty_percona-server-5.6: DNE
3986+trusty/esm_percona-server-5.6: DNE
3987+xenial_percona-server-5.6: needs-triage
3988+bionic_percona-server-5.6: DNE
3989+focal_percona-server-5.6: DNE
3990+groovy_percona-server-5.6: DNE
3991+hirsute_percona-server-5.6: DNE
3992+devel_percona-server-5.6: DNE
3993diff --git a/active/CVE-2021-2412 b/active/CVE-2021-2412
3994new file mode 100644
3995index 0000000..ab0d445
3996--- /dev/null
3997+++ b/active/CVE-2021-2412
3998@@ -0,0 +1,159 @@
3999+Candidate: CVE-2021-2412
4000+PublicDate: 2021-07-21 15:15:00 UTC
4001+References:
4002+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2412
4003+ https://www.oracle.com/security-alerts/cpujul2021.html
4004+Description:
4005+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
4006+ Server: Optimizer). Supported versions that are affected are 8.0.21 and
4007+ prior. Easily exploitable vulnerability allows high privileged attacker
4008+ with network access via multiple protocols to compromise MySQL Server.
4009+ Successful attacks of this vulnerability can result in unauthorized ability
4010+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
4011+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
4012+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
4013+Ubuntu-Description:
4014+Notes:
4015+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
4016+ patch it, marking it as ignored.
4017+Mitigation:
4018+Bugs:
4019+Priority: medium
4020+Discovered-by:
4021+Assigned-to:
4022+CVSS:
4023+ nvd: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4024+
4025+Patches_mysql-5.5:
4026+upstream_mysql-5.5: needs-triage
4027+trusty_mysql-5.5: ignored (out of standard support)
4028+trusty/esm_mysql-5.5: ignored
4029+vivid_mysql-5.5: DNE
4030+xenial_mysql-5.5: DNE
4031+bionic_mysql-5.5: DNE
4032+focal_mysql-5.5: DNE
4033+groovy_mysql-5.5: DNE
4034+hirsute_mysql-5.5: DNE
4035+devel_mysql-5.5: DNE
4036+
4037+Patches_mysql-5.6:
4038+upstream_mysql-5.6: needs-triage
4039+trusty_mysql-5.6: ignored (out of standard support)
4040+trusty/esm_mysql-5.6: DNE
4041+xenial_mysql-5.6: DNE
4042+bionic_mysql-5.6: DNE
4043+focal_mysql-5.6: DNE
4044+groovy_mysql-5.6: DNE
4045+hirsute_mysql-5.6: DNE
4046+devel_mysql-5.6: DNE
4047+
4048+Patches_mysql-5.7:
4049+upstream_mysql-5.7: needs-triage
4050+trusty_mysql-5.7: DNE
4051+trusty/esm_mysql-5.7: DNE
4052+xenial_mysql-5.7: needs-triage
4053+esm-infra/xenial_mysql-5.7: needs-triage
4054+bionic_mysql-5.7: needs-triage
4055+focal_mysql-5.7: DNE
4056+groovy_mysql-5.7: DNE
4057+hirsute_mysql-5.7: DNE
4058+devel_mysql-5.7: DNE
4059+
4060+Patches_mysql-8.0:
4061+upstream_mysql-8.0: needs-triage
4062+trusty_mysql-8.0: DNE
4063+trusty/esm_mysql-8.0: DNE
4064+xenial_mysql-8.0: DNE
4065+bionic_mysql-8.0: DNE
4066+focal_mysql-8.0: needs-triage
4067+groovy_mysql-8.0: needs-triage
4068+hirsute_mysql-8.0: needs-triage
4069+devel_mysql-8.0: needs-triage
4070+
4071+Patches_mariadb-5.5:
4072+upstream_mariadb-5.5: needs-triage
4073+trusty_mariadb-5.5: ignored (out of standard support)
4074+trusty/esm_mariadb-5.5: DNE
4075+xenial_mariadb-5.5: DNE
4076+bionic_mariadb-5.5: DNE
4077+focal_mariadb-5.5: DNE
4078+groovy_mariadb-5.5: DNE
4079+hirsute_mariadb-5.5: DNE
4080+devel_mariadb-5.5: DNE
4081+
4082+Patches_mariadb-10.0:
4083+upstream_mariadb-10.0: needs-triage
4084+trusty_mariadb-10.0: DNE
4085+trusty/esm_mariadb-10.0: DNE
4086+xenial_mariadb-10.0: needs-triage
4087+bionic_mariadb-10.0: DNE
4088+focal_mariadb-10.0: DNE
4089+groovy_mariadb-10.0: DNE
4090+hirsute_mariadb-10.0: DNE
4091+devel_mariadb-10.0: DNE
4092+
4093+Patches_mariadb-10.1:
4094+upstream_mariadb-10.1: needs-triage
4095+trusty_mariadb-10.1: DNE
4096+trusty/esm_mariadb-10.1: DNE
4097+xenial_mariadb-10.1: DNE
4098+bionic_mariadb-10.1: needs-triage
4099+focal_mariadb-10.1: DNE
4100+groovy_mariadb-10.1: DNE
4101+hirsute_mariadb-10.1: DNE
4102+devel_mariadb-10.1: DNE
4103+
4104+Patches_mariadb-10.3:
4105+upstream_mariadb-10.3: needs-triage
4106+trusty_mariadb-10.3: DNE
4107+trusty/esm_mariadb-10.3: DNE
4108+xenial_mariadb-10.3: DNE
4109+bionic_mariadb-10.3: DNE
4110+focal_mariadb-10.3: needs-triage
4111+groovy_mariadb-10.3: needs-triage
4112+hirsute_mariadb-10.3: DNE
4113+devel_mariadb-10.3: DNE
4114+
4115+Patches_mariadb-10.5:
4116+upstream_mariadb-10.5: needs-triage
4117+trusty_mariadb-10.5: DNE
4118+trusty/esm_mariadb-10.5: DNE
4119+xenial_mariadb-10.5: DNE
4120+bionic_mariadb-10.5: DNE
4121+focal_mariadb-10.5: DNE
4122+groovy_mariadb-10.5: DNE
4123+hirsute_mariadb-10.5: needs-triage
4124+devel_mariadb-10.5: needs-triage
4125+
4126+Patches_percona-xtradb-cluster-5.5:
4127+upstream_percona-xtradb-cluster-5.5: needs-triage
4128+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
4129+trusty/esm_percona-xtradb-cluster-5.5: DNE
4130+xenial_percona-xtradb-cluster-5.5: DNE
4131+bionic_percona-xtradb-cluster-5.5: DNE
4132+focal_percona-xtradb-cluster-5.5: DNE
4133+groovy_percona-xtradb-cluster-5.5: DNE
4134+hirsute_percona-xtradb-cluster-5.5: DNE
4135+devel_percona-xtradb-cluster-5.5: DNE
4136+
4137+Patches_percona-xtradb-cluster-5.6:
4138+upstream_percona-xtradb-cluster-5.6: needs-triage
4139+trusty_percona-xtradb-cluster-5.6: DNE
4140+trusty/esm_percona-xtradb-cluster-5.6: DNE
4141+xenial_percona-xtradb-cluster-5.6: needs-triage
4142+bionic_percona-xtradb-cluster-5.6: DNE
4143+focal_percona-xtradb-cluster-5.6: DNE
4144+groovy_percona-xtradb-cluster-5.6: DNE
4145+hirsute_percona-xtradb-cluster-5.6: DNE
4146+devel_percona-xtradb-cluster-5.6: DNE
4147+
4148+Patches_percona-server-5.6:
4149+upstream_percona-server-5.6: needs-triage
4150+trusty_percona-server-5.6: DNE
4151+trusty/esm_percona-server-5.6: DNE
4152+xenial_percona-server-5.6: needs-triage
4153+bionic_percona-server-5.6: DNE
4154+focal_percona-server-5.6: DNE
4155+groovy_percona-server-5.6: DNE
4156+hirsute_percona-server-5.6: DNE
4157+devel_percona-server-5.6: DNE
4158diff --git a/active/CVE-2021-2417 b/active/CVE-2021-2417
4159new file mode 100644
4160index 0000000..008a099
4161--- /dev/null
4162+++ b/active/CVE-2021-2417
4163@@ -0,0 +1,162 @@
4164+Candidate: CVE-2021-2417
4165+PublicDate: 2021-07-21 15:15:00 UTC
4166+References:
4167+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417
4168+ https://www.oracle.com/security-alerts/cpujul2021.html
4169+Description:
4170+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
4171+ Server: GIS). Supported versions that are affected are 8.0.25 and prior.
4172+ Easily exploitable vulnerability allows high privileged attacker with
4173+ network access via multiple protocols to compromise MySQL Server.
4174+ Successful attacks of this vulnerability can result in unauthorized ability
4175+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
4176+ Server as well as unauthorized update, insert or delete access to some of
4177+ MySQL Server accessible data and unauthorized read access to a subset of
4178+ MySQL Server accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality,
4179+ Integrity and Availability impacts). CVSS Vector:
4180+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H).
4181+Ubuntu-Description:
4182+Notes:
4183+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
4184+ patch it, marking it as ignored.
4185+Mitigation:
4186+Bugs:
4187+Priority: medium
4188+Discovered-by:
4189+Assigned-to:
4190+CVSS:
4191+ nvd: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
4192+
4193+Patches_mysql-5.5:
4194+upstream_mysql-5.5: needs-triage
4195+trusty_mysql-5.5: ignored (out of standard support)
4196+trusty/esm_mysql-5.5: ignored
4197+vivid_mysql-5.5: DNE
4198+xenial_mysql-5.5: DNE
4199+bionic_mysql-5.5: DNE
4200+focal_mysql-5.5: DNE
4201+groovy_mysql-5.5: DNE
4202+hirsute_mysql-5.5: DNE
4203+devel_mysql-5.5: DNE
4204+
4205+Patches_mysql-5.6:
4206+upstream_mysql-5.6: needs-triage
4207+trusty_mysql-5.6: ignored (out of standard support)
4208+trusty/esm_mysql-5.6: DNE
4209+xenial_mysql-5.6: DNE
4210+bionic_mysql-5.6: DNE
4211+focal_mysql-5.6: DNE
4212+groovy_mysql-5.6: DNE
4213+hirsute_mysql-5.6: DNE
4214+devel_mysql-5.6: DNE
4215+
4216+Patches_mysql-5.7:
4217+upstream_mysql-5.7: needs-triage
4218+trusty_mysql-5.7: DNE
4219+trusty/esm_mysql-5.7: DNE
4220+xenial_mysql-5.7: needs-triage
4221+esm-infra/xenial_mysql-5.7: needs-triage
4222+bionic_mysql-5.7: needs-triage
4223+focal_mysql-5.7: DNE
4224+groovy_mysql-5.7: DNE
4225+hirsute_mysql-5.7: DNE
4226+devel_mysql-5.7: DNE
4227+
4228+Patches_mysql-8.0:
4229+upstream_mysql-8.0: needs-triage
4230+trusty_mysql-8.0: DNE
4231+trusty/esm_mysql-8.0: DNE
4232+xenial_mysql-8.0: DNE
4233+bionic_mysql-8.0: DNE
4234+focal_mysql-8.0: needs-triage
4235+groovy_mysql-8.0: needs-triage
4236+hirsute_mysql-8.0: needs-triage
4237+devel_mysql-8.0: needs-triage
4238+
4239+Patches_mariadb-5.5:
4240+upstream_mariadb-5.5: needs-triage
4241+trusty_mariadb-5.5: ignored (out of standard support)
4242+trusty/esm_mariadb-5.5: DNE
4243+xenial_mariadb-5.5: DNE
4244+bionic_mariadb-5.5: DNE
4245+focal_mariadb-5.5: DNE
4246+groovy_mariadb-5.5: DNE
4247+hirsute_mariadb-5.5: DNE
4248+devel_mariadb-5.5: DNE
4249+
4250+Patches_mariadb-10.0:
4251+upstream_mariadb-10.0: needs-triage
4252+trusty_mariadb-10.0: DNE
4253+trusty/esm_mariadb-10.0: DNE
4254+xenial_mariadb-10.0: needs-triage
4255+bionic_mariadb-10.0: DNE
4256+focal_mariadb-10.0: DNE
4257+groovy_mariadb-10.0: DNE
4258+hirsute_mariadb-10.0: DNE
4259+devel_mariadb-10.0: DNE
4260+
4261+Patches_mariadb-10.1:
4262+upstream_mariadb-10.1: needs-triage
4263+trusty_mariadb-10.1: DNE
4264+trusty/esm_mariadb-10.1: DNE
4265+xenial_mariadb-10.1: DNE
4266+bionic_mariadb-10.1: needs-triage
4267+focal_mariadb-10.1: DNE
4268+groovy_mariadb-10.1: DNE
4269+hirsute_mariadb-10.1: DNE
4270+devel_mariadb-10.1: DNE
4271+
4272+Patches_mariadb-10.3:
4273+upstream_mariadb-10.3: needs-triage
4274+trusty_mariadb-10.3: DNE
4275+trusty/esm_mariadb-10.3: DNE
4276+xenial_mariadb-10.3: DNE
4277+bionic_mariadb-10.3: DNE
4278+focal_mariadb-10.3: needs-triage
4279+groovy_mariadb-10.3: needs-triage
4280+hirsute_mariadb-10.3: DNE
4281+devel_mariadb-10.3: DNE
4282+
4283+Patches_mariadb-10.5:
4284+upstream_mariadb-10.5: needs-triage
4285+trusty_mariadb-10.5: DNE
4286+trusty/esm_mariadb-10.5: DNE
4287+xenial_mariadb-10.5: DNE
4288+bionic_mariadb-10.5: DNE
4289+focal_mariadb-10.5: DNE
4290+groovy_mariadb-10.5: DNE
4291+hirsute_mariadb-10.5: needs-triage
4292+devel_mariadb-10.5: needs-triage
4293+
4294+Patches_percona-xtradb-cluster-5.5:
4295+upstream_percona-xtradb-cluster-5.5: needs-triage
4296+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
4297+trusty/esm_percona-xtradb-cluster-5.5: DNE
4298+xenial_percona-xtradb-cluster-5.5: DNE
4299+bionic_percona-xtradb-cluster-5.5: DNE
4300+focal_percona-xtradb-cluster-5.5: DNE
4301+groovy_percona-xtradb-cluster-5.5: DNE
4302+hirsute_percona-xtradb-cluster-5.5: DNE
4303+devel_percona-xtradb-cluster-5.5: DNE
4304+
4305+Patches_percona-xtradb-cluster-5.6:
4306+upstream_percona-xtradb-cluster-5.6: needs-triage
4307+trusty_percona-xtradb-cluster-5.6: DNE
4308+trusty/esm_percona-xtradb-cluster-5.6: DNE
4309+xenial_percona-xtradb-cluster-5.6: needs-triage
4310+bionic_percona-xtradb-cluster-5.6: DNE
4311+focal_percona-xtradb-cluster-5.6: DNE
4312+groovy_percona-xtradb-cluster-5.6: DNE
4313+hirsute_percona-xtradb-cluster-5.6: DNE
4314+devel_percona-xtradb-cluster-5.6: DNE
4315+
4316+Patches_percona-server-5.6:
4317+upstream_percona-server-5.6: needs-triage
4318+trusty_percona-server-5.6: DNE
4319+trusty/esm_percona-server-5.6: DNE
4320+xenial_percona-server-5.6: needs-triage
4321+bionic_percona-server-5.6: DNE
4322+focal_percona-server-5.6: DNE
4323+groovy_percona-server-5.6: DNE
4324+hirsute_percona-server-5.6: DNE
4325+devel_percona-server-5.6: DNE
4326diff --git a/active/CVE-2021-2418 b/active/CVE-2021-2418
4327new file mode 100644
4328index 0000000..9253a43
4329--- /dev/null
4330+++ b/active/CVE-2021-2418
4331@@ -0,0 +1,159 @@
4332+Candidate: CVE-2021-2418
4333+PublicDate: 2021-07-21 15:15:00 UTC
4334+References:
4335+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418
4336+ https://www.oracle.com/security-alerts/cpujul2021.html
4337+Description:
4338+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
4339+ Server: Optimizer). Supported versions that are affected are 8.0.25 and
4340+ prior. Easily exploitable vulnerability allows high privileged attacker
4341+ with network access via multiple protocols to compromise MySQL Server.
4342+ Successful attacks of this vulnerability can result in unauthorized ability
4343+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
4344+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
4345+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
4346+Ubuntu-Description:
4347+Notes:
4348+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
4349+ patch it, marking it as ignored.
4350+Mitigation:
4351+Bugs:
4352+Priority: medium
4353+Discovered-by:
4354+Assigned-to:
4355+CVSS:
4356+ nvd: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4357+
4358+Patches_mysql-5.5:
4359+upstream_mysql-5.5: needs-triage
4360+trusty_mysql-5.5: ignored (out of standard support)
4361+trusty/esm_mysql-5.5: ignored
4362+vivid_mysql-5.5: DNE
4363+xenial_mysql-5.5: DNE
4364+bionic_mysql-5.5: DNE
4365+focal_mysql-5.5: DNE
4366+groovy_mysql-5.5: DNE
4367+hirsute_mysql-5.5: DNE
4368+devel_mysql-5.5: DNE
4369+
4370+Patches_mysql-5.6:
4371+upstream_mysql-5.6: needs-triage
4372+trusty_mysql-5.6: ignored (out of standard support)
4373+trusty/esm_mysql-5.6: DNE
4374+xenial_mysql-5.6: DNE
4375+bionic_mysql-5.6: DNE
4376+focal_mysql-5.6: DNE
4377+groovy_mysql-5.6: DNE
4378+hirsute_mysql-5.6: DNE
4379+devel_mysql-5.6: DNE
4380+
4381+Patches_mysql-5.7:
4382+upstream_mysql-5.7: needs-triage
4383+trusty_mysql-5.7: DNE
4384+trusty/esm_mysql-5.7: DNE
4385+xenial_mysql-5.7: needs-triage
4386+esm-infra/xenial_mysql-5.7: needs-triage
4387+bionic_mysql-5.7: needs-triage
4388+focal_mysql-5.7: DNE
4389+groovy_mysql-5.7: DNE
4390+hirsute_mysql-5.7: DNE
4391+devel_mysql-5.7: DNE
4392+
4393+Patches_mysql-8.0:
4394+upstream_mysql-8.0: needs-triage
4395+trusty_mysql-8.0: DNE
4396+trusty/esm_mysql-8.0: DNE
4397+xenial_mysql-8.0: DNE
4398+bionic_mysql-8.0: DNE
4399+focal_mysql-8.0: needs-triage
4400+groovy_mysql-8.0: needs-triage
4401+hirsute_mysql-8.0: needs-triage
4402+devel_mysql-8.0: needs-triage
4403+
4404+Patches_mariadb-5.5:
4405+upstream_mariadb-5.5: needs-triage
4406+trusty_mariadb-5.5: ignored (out of standard support)
4407+trusty/esm_mariadb-5.5: DNE
4408+xenial_mariadb-5.5: DNE
4409+bionic_mariadb-5.5: DNE
4410+focal_mariadb-5.5: DNE
4411+groovy_mariadb-5.5: DNE
4412+hirsute_mariadb-5.5: DNE
4413+devel_mariadb-5.5: DNE
4414+
4415+Patches_mariadb-10.0:
4416+upstream_mariadb-10.0: needs-triage
4417+trusty_mariadb-10.0: DNE
4418+trusty/esm_mariadb-10.0: DNE
4419+xenial_mariadb-10.0: needs-triage
4420+bionic_mariadb-10.0: DNE
4421+focal_mariadb-10.0: DNE
4422+groovy_mariadb-10.0: DNE
4423+hirsute_mariadb-10.0: DNE
4424+devel_mariadb-10.0: DNE
4425+
4426+Patches_mariadb-10.1:
4427+upstream_mariadb-10.1: needs-triage
4428+trusty_mariadb-10.1: DNE
4429+trusty/esm_mariadb-10.1: DNE
4430+xenial_mariadb-10.1: DNE
4431+bionic_mariadb-10.1: needs-triage
4432+focal_mariadb-10.1: DNE
4433+groovy_mariadb-10.1: DNE
4434+hirsute_mariadb-10.1: DNE
4435+devel_mariadb-10.1: DNE
4436+
4437+Patches_mariadb-10.3:
4438+upstream_mariadb-10.3: needs-triage
4439+trusty_mariadb-10.3: DNE
4440+trusty/esm_mariadb-10.3: DNE
4441+xenial_mariadb-10.3: DNE
4442+bionic_mariadb-10.3: DNE
4443+focal_mariadb-10.3: needs-triage
4444+groovy_mariadb-10.3: needs-triage
4445+hirsute_mariadb-10.3: DNE
4446+devel_mariadb-10.3: DNE
4447+
4448+Patches_mariadb-10.5:
4449+upstream_mariadb-10.5: needs-triage
4450+trusty_mariadb-10.5: DNE
4451+trusty/esm_mariadb-10.5: DNE
4452+xenial_mariadb-10.5: DNE
4453+bionic_mariadb-10.5: DNE
4454+focal_mariadb-10.5: DNE
4455+groovy_mariadb-10.5: DNE
4456+hirsute_mariadb-10.5: needs-triage
4457+devel_mariadb-10.5: needs-triage
4458+
4459+Patches_percona-xtradb-cluster-5.5:
4460+upstream_percona-xtradb-cluster-5.5: needs-triage
4461+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
4462+trusty/esm_percona-xtradb-cluster-5.5: DNE
4463+xenial_percona-xtradb-cluster-5.5: DNE
4464+bionic_percona-xtradb-cluster-5.5: DNE
4465+focal_percona-xtradb-cluster-5.5: DNE
4466+groovy_percona-xtradb-cluster-5.5: DNE
4467+hirsute_percona-xtradb-cluster-5.5: DNE
4468+devel_percona-xtradb-cluster-5.5: DNE
4469+
4470+Patches_percona-xtradb-cluster-5.6:
4471+upstream_percona-xtradb-cluster-5.6: needs-triage
4472+trusty_percona-xtradb-cluster-5.6: DNE
4473+trusty/esm_percona-xtradb-cluster-5.6: DNE
4474+xenial_percona-xtradb-cluster-5.6: needs-triage
4475+bionic_percona-xtradb-cluster-5.6: DNE
4476+focal_percona-xtradb-cluster-5.6: DNE
4477+groovy_percona-xtradb-cluster-5.6: DNE
4478+hirsute_percona-xtradb-cluster-5.6: DNE
4479+devel_percona-xtradb-cluster-5.6: DNE
4480+
4481+Patches_percona-server-5.6:
4482+upstream_percona-server-5.6: needs-triage
4483+trusty_percona-server-5.6: DNE
4484+trusty/esm_percona-server-5.6: DNE
4485+xenial_percona-server-5.6: needs-triage
4486+bionic_percona-server-5.6: DNE
4487+focal_percona-server-5.6: DNE
4488+groovy_percona-server-5.6: DNE
4489+hirsute_percona-server-5.6: DNE
4490+devel_percona-server-5.6: DNE
4491diff --git a/active/CVE-2021-2422 b/active/CVE-2021-2422
4492new file mode 100644
4493index 0000000..bae57af
4494--- /dev/null
4495+++ b/active/CVE-2021-2422
4496@@ -0,0 +1,159 @@
4497+Candidate: CVE-2021-2422
4498+PublicDate: 2021-07-21 15:15:00 UTC
4499+References:
4500+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422
4501+ https://www.oracle.com/security-alerts/cpujul2021.html
4502+Description:
4503+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
4504+ Server: PS). Supported versions that are affected are 8.0.25 and prior.
4505+ Easily exploitable vulnerability allows high privileged attacker with
4506+ network access via multiple protocols to compromise MySQL Server.
4507+ Successful attacks of this vulnerability can result in unauthorized ability
4508+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
4509+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
4510+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
4511+Ubuntu-Description:
4512+Notes:
4513+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
4514+ patch it, marking it as ignored.
4515+Mitigation:
4516+Bugs:
4517+Priority: medium
4518+Discovered-by:
4519+Assigned-to:
4520+CVSS:
4521+ nvd: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4522+
4523+Patches_mysql-5.5:
4524+upstream_mysql-5.5: needs-triage
4525+trusty_mysql-5.5: ignored (out of standard support)
4526+trusty/esm_mysql-5.5: ignored
4527+vivid_mysql-5.5: DNE
4528+xenial_mysql-5.5: DNE
4529+bionic_mysql-5.5: DNE
4530+focal_mysql-5.5: DNE
4531+groovy_mysql-5.5: DNE
4532+hirsute_mysql-5.5: DNE
4533+devel_mysql-5.5: DNE
4534+
4535+Patches_mysql-5.6:
4536+upstream_mysql-5.6: needs-triage
4537+trusty_mysql-5.6: ignored (out of standard support)
4538+trusty/esm_mysql-5.6: DNE
4539+xenial_mysql-5.6: DNE
4540+bionic_mysql-5.6: DNE
4541+focal_mysql-5.6: DNE
4542+groovy_mysql-5.6: DNE
4543+hirsute_mysql-5.6: DNE
4544+devel_mysql-5.6: DNE
4545+
4546+Patches_mysql-5.7:
4547+upstream_mysql-5.7: needs-triage
4548+trusty_mysql-5.7: DNE
4549+trusty/esm_mysql-5.7: DNE
4550+xenial_mysql-5.7: needs-triage
4551+esm-infra/xenial_mysql-5.7: needs-triage
4552+bionic_mysql-5.7: needs-triage
4553+focal_mysql-5.7: DNE
4554+groovy_mysql-5.7: DNE
4555+hirsute_mysql-5.7: DNE
4556+devel_mysql-5.7: DNE
4557+
4558+Patches_mysql-8.0:
4559+upstream_mysql-8.0: needs-triage
4560+trusty_mysql-8.0: DNE
4561+trusty/esm_mysql-8.0: DNE
4562+xenial_mysql-8.0: DNE
4563+bionic_mysql-8.0: DNE
4564+focal_mysql-8.0: needs-triage
4565+groovy_mysql-8.0: needs-triage
4566+hirsute_mysql-8.0: needs-triage
4567+devel_mysql-8.0: needs-triage
4568+
4569+Patches_mariadb-5.5:
4570+upstream_mariadb-5.5: needs-triage
4571+trusty_mariadb-5.5: ignored (out of standard support)
4572+trusty/esm_mariadb-5.5: DNE
4573+xenial_mariadb-5.5: DNE
4574+bionic_mariadb-5.5: DNE
4575+focal_mariadb-5.5: DNE
4576+groovy_mariadb-5.5: DNE
4577+hirsute_mariadb-5.5: DNE
4578+devel_mariadb-5.5: DNE
4579+
4580+Patches_mariadb-10.0:
4581+upstream_mariadb-10.0: needs-triage
4582+trusty_mariadb-10.0: DNE
4583+trusty/esm_mariadb-10.0: DNE
4584+xenial_mariadb-10.0: needs-triage
4585+bionic_mariadb-10.0: DNE
4586+focal_mariadb-10.0: DNE
4587+groovy_mariadb-10.0: DNE
4588+hirsute_mariadb-10.0: DNE
4589+devel_mariadb-10.0: DNE
4590+
4591+Patches_mariadb-10.1:
4592+upstream_mariadb-10.1: needs-triage
4593+trusty_mariadb-10.1: DNE
4594+trusty/esm_mariadb-10.1: DNE
4595+xenial_mariadb-10.1: DNE
4596+bionic_mariadb-10.1: needs-triage
4597+focal_mariadb-10.1: DNE
4598+groovy_mariadb-10.1: DNE
4599+hirsute_mariadb-10.1: DNE
4600+devel_mariadb-10.1: DNE
4601+
4602+Patches_mariadb-10.3:
4603+upstream_mariadb-10.3: needs-triage
4604+trusty_mariadb-10.3: DNE
4605+trusty/esm_mariadb-10.3: DNE
4606+xenial_mariadb-10.3: DNE
4607+bionic_mariadb-10.3: DNE
4608+focal_mariadb-10.3: needs-triage
4609+groovy_mariadb-10.3: needs-triage
4610+hirsute_mariadb-10.3: DNE
4611+devel_mariadb-10.3: DNE
4612+
4613+Patches_mariadb-10.5:
4614+upstream_mariadb-10.5: needs-triage
4615+trusty_mariadb-10.5: DNE
4616+trusty/esm_mariadb-10.5: DNE
4617+xenial_mariadb-10.5: DNE
4618+bionic_mariadb-10.5: DNE
4619+focal_mariadb-10.5: DNE
4620+groovy_mariadb-10.5: DNE
4621+hirsute_mariadb-10.5: needs-triage
4622+devel_mariadb-10.5: needs-triage
4623+
4624+Patches_percona-xtradb-cluster-5.5:
4625+upstream_percona-xtradb-cluster-5.5: needs-triage
4626+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
4627+trusty/esm_percona-xtradb-cluster-5.5: DNE
4628+xenial_percona-xtradb-cluster-5.5: DNE
4629+bionic_percona-xtradb-cluster-5.5: DNE
4630+focal_percona-xtradb-cluster-5.5: DNE
4631+groovy_percona-xtradb-cluster-5.5: DNE
4632+hirsute_percona-xtradb-cluster-5.5: DNE
4633+devel_percona-xtradb-cluster-5.5: DNE
4634+
4635+Patches_percona-xtradb-cluster-5.6:
4636+upstream_percona-xtradb-cluster-5.6: needs-triage
4637+trusty_percona-xtradb-cluster-5.6: DNE
4638+trusty/esm_percona-xtradb-cluster-5.6: DNE
4639+xenial_percona-xtradb-cluster-5.6: needs-triage
4640+bionic_percona-xtradb-cluster-5.6: DNE
4641+focal_percona-xtradb-cluster-5.6: DNE
4642+groovy_percona-xtradb-cluster-5.6: DNE
4643+hirsute_percona-xtradb-cluster-5.6: DNE
4644+devel_percona-xtradb-cluster-5.6: DNE
4645+
4646+Patches_percona-server-5.6:
4647+upstream_percona-server-5.6: needs-triage
4648+trusty_percona-server-5.6: DNE
4649+trusty/esm_percona-server-5.6: DNE
4650+xenial_percona-server-5.6: needs-triage
4651+bionic_percona-server-5.6: DNE
4652+focal_percona-server-5.6: DNE
4653+groovy_percona-server-5.6: DNE
4654+hirsute_percona-server-5.6: DNE
4655+devel_percona-server-5.6: DNE
4656diff --git a/active/CVE-2021-2424 b/active/CVE-2021-2424
4657new file mode 100644
4658index 0000000..12da675
4659--- /dev/null
4660+++ b/active/CVE-2021-2424
4661@@ -0,0 +1,158 @@
4662+Candidate: CVE-2021-2424
4663+PublicDate: 2021-07-21 15:15:00 UTC
4664+References:
4665+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424
4666+ https://www.oracle.com/security-alerts/cpujul2021.html
4667+Description:
4668+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
4669+ Server: Stored Procedure). Supported versions that are affected are 8.0.25
4670+ and prior. Easily exploitable vulnerability allows high privileged attacker
4671+ with network access via multiple protocols to compromise MySQL Server.
4672+ Successful attacks of this vulnerability can result in unauthorized ability
4673+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
4674+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
4675+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
4676+Ubuntu-Description:
4677+Notes:
4678+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
4679+ patch it, marking it as ignored.
4680+Mitigation:
4681+Bugs:
4682+Priority: medium
4683+Discovered-by:
4684+Assigned-to:
4685+CVSS:
4686+
4687+Patches_mysql-5.5:
4688+upstream_mysql-5.5: needs-triage
4689+trusty_mysql-5.5: ignored (out of standard support)
4690+trusty/esm_mysql-5.5: ignored
4691+vivid_mysql-5.5: DNE
4692+xenial_mysql-5.5: DNE
4693+bionic_mysql-5.5: DNE
4694+focal_mysql-5.5: DNE
4695+groovy_mysql-5.5: DNE
4696+hirsute_mysql-5.5: DNE
4697+devel_mysql-5.5: DNE
4698+
4699+Patches_mysql-5.6:
4700+upstream_mysql-5.6: needs-triage
4701+trusty_mysql-5.6: ignored (out of standard support)
4702+trusty/esm_mysql-5.6: DNE
4703+xenial_mysql-5.6: DNE
4704+bionic_mysql-5.6: DNE
4705+focal_mysql-5.6: DNE
4706+groovy_mysql-5.6: DNE
4707+hirsute_mysql-5.6: DNE
4708+devel_mysql-5.6: DNE
4709+
4710+Patches_mysql-5.7:
4711+upstream_mysql-5.7: needs-triage
4712+trusty_mysql-5.7: DNE
4713+trusty/esm_mysql-5.7: DNE
4714+xenial_mysql-5.7: needs-triage
4715+esm-infra/xenial_mysql-5.7: needs-triage
4716+bionic_mysql-5.7: needs-triage
4717+focal_mysql-5.7: DNE
4718+groovy_mysql-5.7: DNE
4719+hirsute_mysql-5.7: DNE
4720+devel_mysql-5.7: DNE
4721+
4722+Patches_mysql-8.0:
4723+upstream_mysql-8.0: needs-triage
4724+trusty_mysql-8.0: DNE
4725+trusty/esm_mysql-8.0: DNE
4726+xenial_mysql-8.0: DNE
4727+bionic_mysql-8.0: DNE
4728+focal_mysql-8.0: needs-triage
4729+groovy_mysql-8.0: needs-triage
4730+hirsute_mysql-8.0: needs-triage
4731+devel_mysql-8.0: needs-triage
4732+
4733+Patches_mariadb-5.5:
4734+upstream_mariadb-5.5: needs-triage
4735+trusty_mariadb-5.5: ignored (out of standard support)
4736+trusty/esm_mariadb-5.5: DNE
4737+xenial_mariadb-5.5: DNE
4738+bionic_mariadb-5.5: DNE
4739+focal_mariadb-5.5: DNE
4740+groovy_mariadb-5.5: DNE
4741+hirsute_mariadb-5.5: DNE
4742+devel_mariadb-5.5: DNE
4743+
4744+Patches_mariadb-10.0:
4745+upstream_mariadb-10.0: needs-triage
4746+trusty_mariadb-10.0: DNE
4747+trusty/esm_mariadb-10.0: DNE
4748+xenial_mariadb-10.0: needs-triage
4749+bionic_mariadb-10.0: DNE
4750+focal_mariadb-10.0: DNE
4751+groovy_mariadb-10.0: DNE
4752+hirsute_mariadb-10.0: DNE
4753+devel_mariadb-10.0: DNE
4754+
4755+Patches_mariadb-10.1:
4756+upstream_mariadb-10.1: needs-triage
4757+trusty_mariadb-10.1: DNE
4758+trusty/esm_mariadb-10.1: DNE
4759+xenial_mariadb-10.1: DNE
4760+bionic_mariadb-10.1: needs-triage
4761+focal_mariadb-10.1: DNE
4762+groovy_mariadb-10.1: DNE
4763+hirsute_mariadb-10.1: DNE
4764+devel_mariadb-10.1: DNE
4765+
4766+Patches_mariadb-10.3:
4767+upstream_mariadb-10.3: needs-triage
4768+trusty_mariadb-10.3: DNE
4769+trusty/esm_mariadb-10.3: DNE
4770+xenial_mariadb-10.3: DNE
4771+bionic_mariadb-10.3: DNE
4772+focal_mariadb-10.3: needs-triage
4773+groovy_mariadb-10.3: needs-triage
4774+hirsute_mariadb-10.3: DNE
4775+devel_mariadb-10.3: DNE
4776+
4777+Patches_mariadb-10.5:
4778+upstream_mariadb-10.5: needs-triage
4779+trusty_mariadb-10.5: DNE
4780+trusty/esm_mariadb-10.5: DNE
4781+xenial_mariadb-10.5: DNE
4782+bionic_mariadb-10.5: DNE
4783+focal_mariadb-10.5: DNE
4784+groovy_mariadb-10.5: DNE
4785+hirsute_mariadb-10.5: needs-triage
4786+devel_mariadb-10.5: needs-triage
4787+
4788+Patches_percona-xtradb-cluster-5.5:
4789+upstream_percona-xtradb-cluster-5.5: needs-triage
4790+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
4791+trusty/esm_percona-xtradb-cluster-5.5: DNE
4792+xenial_percona-xtradb-cluster-5.5: DNE
4793+bionic_percona-xtradb-cluster-5.5: DNE
4794+focal_percona-xtradb-cluster-5.5: DNE
4795+groovy_percona-xtradb-cluster-5.5: DNE
4796+hirsute_percona-xtradb-cluster-5.5: DNE
4797+devel_percona-xtradb-cluster-5.5: DNE
4798+
4799+Patches_percona-xtradb-cluster-5.6:
4800+upstream_percona-xtradb-cluster-5.6: needs-triage
4801+trusty_percona-xtradb-cluster-5.6: DNE
4802+trusty/esm_percona-xtradb-cluster-5.6: DNE
4803+xenial_percona-xtradb-cluster-5.6: needs-triage
4804+bionic_percona-xtradb-cluster-5.6: DNE
4805+focal_percona-xtradb-cluster-5.6: DNE
4806+groovy_percona-xtradb-cluster-5.6: DNE
4807+hirsute_percona-xtradb-cluster-5.6: DNE
4808+devel_percona-xtradb-cluster-5.6: DNE
4809+
4810+Patches_percona-server-5.6:
4811+upstream_percona-server-5.6: needs-triage
4812+trusty_percona-server-5.6: DNE
4813+trusty/esm_percona-server-5.6: DNE
4814+xenial_percona-server-5.6: needs-triage
4815+bionic_percona-server-5.6: DNE
4816+focal_percona-server-5.6: DNE
4817+groovy_percona-server-5.6: DNE
4818+hirsute_percona-server-5.6: DNE
4819+devel_percona-server-5.6: DNE
4820diff --git a/active/CVE-2021-2425 b/active/CVE-2021-2425
4821new file mode 100644
4822index 0000000..3c2ffce
4823--- /dev/null
4824+++ b/active/CVE-2021-2425
4825@@ -0,0 +1,158 @@
4826+Candidate: CVE-2021-2425
4827+PublicDate: 2021-07-21 15:15:00 UTC
4828+References:
4829+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425
4830+ https://www.oracle.com/security-alerts/cpujul2021.html
4831+Description:
4832+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
4833+ Server: Optimizer). Supported versions that are affected are 8.0.25 and
4834+ prior. Easily exploitable vulnerability allows high privileged attacker
4835+ with network access via multiple protocols to compromise MySQL Server.
4836+ Successful attacks of this vulnerability can result in unauthorized ability
4837+ to cause a hang or frequently repeatable crash (complete DOS) of MySQL
4838+ Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:
4839+ (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
4840+Ubuntu-Description:
4841+Notes:
4842+ leosilva> since 5.5 is no longer upstream supported and so far we cannot
4843+ patch it, marking it as ignored.
4844+Mitigation:
4845+Bugs:
4846+Priority: medium
4847+Discovered-by:
4848+Assigned-to:
4849+CVSS:
4850+
4851+Patches_mysql-5.5:
4852+upstream_mysql-5.5: needs-triage
4853+trusty_mysql-5.5: ignored (out of standard support)
4854+trusty/esm_mysql-5.5: ignored
4855+vivid_mysql-5.5: DNE
4856+xenial_mysql-5.5: DNE
4857+bionic_mysql-5.5: DNE
4858+focal_mysql-5.5: DNE
4859+groovy_mysql-5.5: DNE
4860+hirsute_mysql-5.5: DNE
4861+devel_mysql-5.5: DNE
4862+
4863+Patches_mysql-5.6:
4864+upstream_mysql-5.6: needs-triage
4865+trusty_mysql-5.6: ignored (out of standard support)
4866+trusty/esm_mysql-5.6: DNE
4867+xenial_mysql-5.6: DNE
4868+bionic_mysql-5.6: DNE
4869+focal_mysql-5.6: DNE
4870+groovy_mysql-5.6: DNE
4871+hirsute_mysql-5.6: DNE
4872+devel_mysql-5.6: DNE
4873+
4874+Patches_mysql-5.7:
4875+upstream_mysql-5.7: needs-triage
4876+trusty_mysql-5.7: DNE
4877+trusty/esm_mysql-5.7: DNE
4878+xenial_mysql-5.7: needs-triage
4879+esm-infra/xenial_mysql-5.7: needs-triage
4880+bionic_mysql-5.7: needs-triage
4881+focal_mysql-5.7: DNE
4882+groovy_mysql-5.7: DNE
4883+hirsute_mysql-5.7: DNE
4884+devel_mysql-5.7: DNE
4885+
4886+Patches_mysql-8.0:
4887+upstream_mysql-8.0: needs-triage
4888+trusty_mysql-8.0: DNE
4889+trusty/esm_mysql-8.0: DNE
4890+xenial_mysql-8.0: DNE
4891+bionic_mysql-8.0: DNE
4892+focal_mysql-8.0: needs-triage
4893+groovy_mysql-8.0: needs-triage
4894+hirsute_mysql-8.0: needs-triage
4895+devel_mysql-8.0: needs-triage
4896+
4897+Patches_mariadb-5.5:
4898+upstream_mariadb-5.5: needs-triage
4899+trusty_mariadb-5.5: ignored (out of standard support)
4900+trusty/esm_mariadb-5.5: DNE
4901+xenial_mariadb-5.5: DNE
4902+bionic_mariadb-5.5: DNE
4903+focal_mariadb-5.5: DNE
4904+groovy_mariadb-5.5: DNE
4905+hirsute_mariadb-5.5: DNE
4906+devel_mariadb-5.5: DNE
4907+
4908+Patches_mariadb-10.0:
4909+upstream_mariadb-10.0: needs-triage
4910+trusty_mariadb-10.0: DNE
4911+trusty/esm_mariadb-10.0: DNE
4912+xenial_mariadb-10.0: needs-triage
4913+bionic_mariadb-10.0: DNE
4914+focal_mariadb-10.0: DNE
4915+groovy_mariadb-10.0: DNE
4916+hirsute_mariadb-10.0: DNE
4917+devel_mariadb-10.0: DNE
4918+
4919+Patches_mariadb-10.1:
4920+upstream_mariadb-10.1: needs-triage
4921+trusty_mariadb-10.1: DNE
4922+trusty/esm_mariadb-10.1: DNE
4923+xenial_mariadb-10.1: DNE
4924+bionic_mariadb-10.1: needs-triage
4925+focal_mariadb-10.1: DNE
4926+groovy_mariadb-10.1: DNE
4927+hirsute_mariadb-10.1: DNE
4928+devel_mariadb-10.1: DNE
4929+
4930+Patches_mariadb-10.3:
4931+upstream_mariadb-10.3: needs-triage
4932+trusty_mariadb-10.3: DNE
4933+trusty/esm_mariadb-10.3: DNE
4934+xenial_mariadb-10.3: DNE
4935+bionic_mariadb-10.3: DNE
4936+focal_mariadb-10.3: needs-triage
4937+groovy_mariadb-10.3: needs-triage
4938+hirsute_mariadb-10.3: DNE
4939+devel_mariadb-10.3: DNE
4940+
4941+Patches_mariadb-10.5:
4942+upstream_mariadb-10.5: needs-triage
4943+trusty_mariadb-10.5: DNE
4944+trusty/esm_mariadb-10.5: DNE
4945+xenial_mariadb-10.5: DNE
4946+bionic_mariadb-10.5: DNE
4947+focal_mariadb-10.5: DNE
4948+groovy_mariadb-10.5: DNE
4949+hirsute_mariadb-10.5: needs-triage
4950+devel_mariadb-10.5: needs-triage
4951+
4952+Patches_percona-xtradb-cluster-5.5:
4953+upstream_percona-xtradb-cluster-5.5: needs-triage
4954+trusty_percona-xtradb-cluster-5.5: ignored (out of standard support)
4955+trusty/esm_percona-xtradb-cluster-5.5: DNE
4956+xenial_percona-xtradb-cluster-5.5: DNE
4957+bionic_percona-xtradb-cluster-5.5: DNE
4958+focal_percona-xtradb-cluster-5.5: DNE
4959+groovy_percona-xtradb-cluster-5.5: DNE
4960+hirsute_percona-xtradb-cluster-5.5: DNE
4961+devel_percona-xtradb-cluster-5.5: DNE
4962+
4963+Patches_percona-xtradb-cluster-5.6:
4964+upstream_percona-xtradb-cluster-5.6: needs-triage
4965+trusty_percona-xtradb-cluster-5.6: DNE
4966+trusty/esm_percona-xtradb-cluster-5.6: DNE
4967+xenial_percona-xtradb-cluster-5.6: needs-triage
4968+bionic_percona-xtradb-cluster-5.6: DNE
4969+focal_percona-xtradb-cluster-5.6: DNE
4970+groovy_percona-xtradb-cluster-5.6: DNE
4971+hirsute_percona-xtradb-cluster-5.6: DNE
4972+devel_percona-xtradb-cluster-5.6: DNE
4973+
4974+Patches_percona-server-5.6:
4975+upstream_percona-server-5.6: needs-triage
4976+trusty_percona-server-5.6: DNE
4977+trusty/esm_percona-server-5.6: DNE
4978+xenial_percona-server-5.6: needs-triage
4979+bionic_percona-server-5.6: DNE
4980+focal_percona-server-5.6: DNE
4981+groovy_percona-server-5.6: DNE
4982+hirsute_percona-server-5.6: DNE
4983+devel_percona-server-5.6: DNE
4984diff --git a/active/CVE-2021-2426 b/active/CVE-2021-2426
4985new file mode 100644
4986index 0000000..0511841
4987--- /dev/null
4988+++ b/active/CVE-2021-2426
4989@@ -0,0 +1,158 @@
4990+Candidate: CVE-2021-2426
4991+PublicDate: 2021-07-21 15:15:00 UTC
4992+References:
4993+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426
4994+ https://www.oracle.com/security-alerts/cpujul2021.html
4995+Description:
4996+ Vulnerability in the MySQL Server product of Oracle MySQL (component:
4997+ Server: Optimizer). Supported versions that are affected are 8.0.25 and
4998+ prior. Easily exploitable vulnerability allows high privileged attacker
4999+ with network access via multiple protocols to compromise MySQL Server.
5000+ Successful attacks of this vulnerability can result in unauthorized ability
The diff has been truncated for viewing.

Subscribers

People subscribed via source and target branches